Add a Comment to the Log
Build Comments
[bsmith@mozilla.com - 2012/11/27 18:00:21]
Looks like random orange
caused by DNS server failure
Build Error Summary
Build Error Log
tinderbox: tree: NSS
tinderbox: builddate: 1354060331
tinderbox: status: testfailed
tinderbox: build: trunk standard buildnss02 Linux/Fedora17 64bit DBG
tinderbox: errorparser: unix
tinderbox: buildfamily: unix
tinderbox: END
TB [2012-11-27 18:52:11] ######## Environment variables ########
Linux buildnss02.localdomain 3.6.6-1.fc17.x86_64 #1 SMP Mon Nov 5 21:59:35 UTC 2012 x86_64 x86_64 x86_64 GNU/Linux
Fedora release 17 (Beefy Miracle)
XDG_SESSION_ID=54
HOSTNAME=buildnss02.localdomain
SELINUX_ROLE_REQUESTED=
SHELL=/bin/bash
TERM=screen
HISTSIZE=1000
SSH_CLIENT=10.36.116.85 42490 22
PORT_JSSE_SERVER=8583
PKITS_DATA=/home/tinderbox/pkits/data/
SELINUX_USE_CURRENT_RANGE=
OLDPWD=/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_stable_32_OPT/mozilla/security/jss/org/mozilla/jss/tests
CVS_LIST=mozilla/nsprpub
mozilla/dbm
mozilla/security/dbm
mozilla/security/coreconf
mozilla/security/nss
mozilla/security/jss
-r:NSS_3_11_1_RTM:mozilla/security/nss/lib/freebl/ecl/ecl-curve.h
SSH_TTY=/dev/pts/0
BRANCH=trunk
QT_GRAPHICSSYSTEM_CHECKED=1
USER=tinderbox
LS_COLORS=rs=0:di=01;34:ln=01;36:mh=00:pi=40;33:so=01;35:do=01;35:bd=40;33;01:cd=40;33;01:or=40;31;01:mi=01;05;37;41:su=37;41:sg=30;43:ca=30;41:tw=30;42:ow=34;42:st=37;44:ex=01;32:*.tar=01;31:*.tgz=01;31:*.arj=01;31:*.taz=01;31:*.lzh=01;31:*.lzma=01;31:*.tlz=01;31:*.txz=01;31:*.zip=01;31:*.z=01;31:*.Z=01;31:*.dz=01;31:*.gz=01;31:*.lz=01;31:*.xz=01;31:*.bz2=01;31:*.tbz=01;31:*.tbz2=01;31:*.bz=01;31:*.tz=01;31:*.deb=01;31:*.rpm=01;31:*.jar=01;31:*.war=01;31:*.ear=01;31:*.sar=01;31:*.rar=01;31:*.ace=01;31:*.zoo=01;31:*.cpio=01;31:*.7z=01;31:*.rz=01;31:*.jpg=01;35:*.jpeg=01;35:*.gif=01;35:*.bmp=01;35:*.pbm=01;35:*.pgm=01;35:*.ppm=01;35:*.tga=01;35:*.xbm=01;35:*.xpm=01;35:*.tif=01;35:*.tiff=01;35:*.png=01;35:*.svg=01;35:*.svgz=01;35:*.mng=01;35:*.pcx=01;35:*.mov=01;35:*.mpg=01;35:*.mpeg=01;35:*.m2v=01;35:*.mkv=01;35:*.ogm=01;35:*.mp4=01;35:*.m4v=01;35:*.mp4v=01;35:*.vob=01;35:*.qt=01;35:*.nuv=01;35:*.wmv=01;35:*.asf=01;35:*.rm=01;35:*.rmvb=01;35:*.flc=01;35:*.avi=01;35:*.fli=01;35:*.flv=01;35:*.gl=01;35:*.dl=01;35:*.xcf=01;35:*.xwd=01;35:*.yuv=01;35:*.cgm=01;35:*.emf=01;35:*.axv=01;35:*.anx=01;35:*.ogv=01;35:*.ogx=01;35:*.aac=01;36:*.au=01;36:*.flac=01;36:*.mid=01;36:*.midi=01;36:*.mka=01;36:*.mp3=01;36:*.mpc=01;36:*.ogg=01;36:*.ra=01;36:*.wav=01;36:*.axa=01;36:*.oga=01;36:*.spx=01;36:*.xspf=01;36:*.pdf=00;33:*.ps=00;33:*.ps.gz=00;33:*.txt=00;33:*.patch=00;33:*.diff=00;33:*.log=00;33:*.tex=00;33:*.xls=00;33:*.xlsx=00;33:*.ppt=00;33:*.pptx=00;33:*.rtf=00;33:*.doc=00;33:*.docx=00;33:*.odt=00;33:*.ods=00;33:*.odp=00;33:*.xml=00;33:*.epub=00;33:*.abw=00;33:*.htm=00;33:*.html=00;33:*.shtml=00;33:*.wpd=00;33:
NSS_ECC_MORE_THAN_SUITE_B=1
TERMCAP=SC|screen|VT 100/ANSI X3.64 virtual terminal:\
:DO=\E[%dB:LE=\E[%dD:RI=\E[%dC:UP=\E[%dA:bs:bt=\E[Z:\
:cd=\E[J:ce=\E[K:cl=\E[H\E[J:cm=\E[%i%d;%dH:ct=\E[3g:\
:do=^J:nd=\E[C:pt:rc=\E8:rs=\Ec:sc=\E7:st=\EH:up=\EM:\
:le=^H:bl=^G:cr=^M:it#8:ho=\E[H:nw=\EE:ta=^I:is=\E)0:\
:li#84:co#272:am:xn:xv:LP:sr=\EM:al=\E[L:AL=\E[%dL:\
:cs=\E[%i%d;%dr:dl=\E[M:DL=\E[%dM:dc=\E[P:DC=\E[%dP:\
:im=\E[4h:ei=\E[4l:mi:IC=\E[%d@:ks=\E[?1h\E=:\
:ke=\E[?1l\E>:vi=\E[?25l:ve=\E[34h\E[?25h:vs=\E[34l:\
:ti=\E[?1049h:te=\E[?1049l:us=\E[4m:ue=\E[24m:so=\E[3m:\
:se=\E[23m:mb=\E[5m:md=\E[1m:mr=\E[7m:me=\E[m:ms:\
:Co#8:pa#64:AF=\E[3%dm:AB=\E[4%dm:op=\E[39;49m:AX:\
:vb=\Eg:G0:as=\E(0:ae=\E(B:\
:ac=\140\140aaffggjjkkllmmnnooppqqrrssttuuvvwwxxyyzz{{||}}~~..--++,,hhII00:\
:po=\E[5i:pf=\E[4i:Km=\E[M:k0=\E[10~:k1=\EOP:k2=\EOQ:\
:k3=\EOR:k4=\EOS:k5=\E[15~:k6=\E[17~:k7=\E[18~:\
:k8=\E[19~:k9=\E[20~:k;=\E[21~:F1=\E[23~:F2=\E[24~:\
:F3=\E[1;2P:F4=\E[1;2Q:F5=\E[1;2R:F6=\E[1;2S:\
:F7=\E[15;2~:F8=\E[17;2~:F9=\E[18;2~:FA=\E[19;2~:kb=:\
:K2=\EOE:kB=\E[Z:kF=\E[1;2B:kR=\E[1;2A:*4=\E[3;2~:\
:*7=\E[1;2F:#2=\E[1;2H:#3=\E[2;2~:#4=\E[1;2D:%c=\E[6;2~:\
:%e=\E[5;2~:%i=\E[1;2C:kh=\E[1~:@1=\E[1~:kH=\E[4~:\
:@7=\E[4~:kN=\E[6~:kP=\E[5~:kI=\E[2~:kD=\E[3~:ku=\EOA:\
:kd=\EOB:kr=\EOC:kl=\EOD:km:
PATH=/usr/lib64/ccache:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin:/home/tinderbox/.local/bin:/home/tinderbox/bin
DOMSUF=usersys.redhat.com
STY=11598.pts-0.buildnss02
NSS_ENABLE_ECC=1
PWD=/home/tinderbox/mozilla/security/tinderlight
JAVA_HOME=/usr/lib/jvm/java-1.6.0-openjdk.x86_64
XMODIFIERS=@im=none
LANG=en_US.UTF-8
QT_GRAPHICSSYSTEM=native
SELINUX_LEVEL_REQUESTED=
HISTCONTROL=ignoredups
HOME=/home/tinderbox
SHLVL=4
NSPR_LOG_MODULES=pkix:1
TB_TREE=NSS
USE_64=1
LOGNAME=tinderbox
CVS_RSH=ssh
WINDOW=0
SSH_CONNECTION=10.36.116.85 42490 10.16.79.157 22
BUILD_OPT=
LESSOPEN=||/usr/bin/lesspipe.sh %s
PORT=8543
XDG_RUNTIME_DIR=/run/user/tinderbox
PORT_JSS_SERVER=8563
CCACHE_HASHDIR=
_=/usr/bin/env
TB [2012-11-27 18:52:11] ######## CVS checkout ########
TB [2012-11-27 18:52:11] $ cd /home/tinderbox/mozilla/security/tinderlight/data/mozilla-cvs-trunk
TB [2012-11-27 18:52:11] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/nsprpub
cvs checkout: Updating mozilla/nsprpub
cvs checkout: Updating mozilla/nsprpub/admin
cvs checkout: Updating mozilla/nsprpub/build
cvs checkout: Updating mozilla/nsprpub/build/autoconf
cvs checkout: Updating mozilla/nsprpub/build/win32
cvs checkout: Updating mozilla/nsprpub/config
cvs checkout: Updating mozilla/nsprpub/include
cvs checkout: Updating mozilla/nsprpub/lib
cvs checkout: Updating mozilla/nsprpub/lib/ds
cvs checkout: Updating mozilla/nsprpub/lib/libc
cvs checkout: Updating mozilla/nsprpub/lib/libc/include
cvs checkout: Updating mozilla/nsprpub/lib/libc/src
cvs checkout: Updating mozilla/nsprpub/lib/msgc
cvs checkout: Updating mozilla/nsprpub/lib/msgc/include
cvs checkout: Updating mozilla/nsprpub/lib/msgc/src
cvs checkout: Updating mozilla/nsprpub/lib/msgc/tests
cvs checkout: Updating mozilla/nsprpub/lib/prstreams
cvs checkout: Updating mozilla/nsprpub/lib/prstreams/tests
cvs checkout: Updating mozilla/nsprpub/lib/prstreams/tests/testprstrm
cvs checkout: Updating mozilla/nsprpub/lib/tests
cvs checkout: Updating mozilla/nsprpub/lib/tests/windows
cvs checkout: Updating mozilla/nsprpub/macbuild
cvs checkout: Updating mozilla/nsprpub/pkg
cvs checkout: Updating mozilla/nsprpub/pkg/linux
cvs checkout: Updating mozilla/nsprpub/pkg/solaris
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWnspr
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWnsprx
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWpr
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWpr-devl
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWprd
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWprdx
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWprx
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWprx-devl
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/common_files
cvs checkout: Updating mozilla/nsprpub/pr
cvs checkout: Updating mozilla/nsprpub/pr/include
cvs checkout: Updating mozilla/nsprpub/pr/include/md
cvs checkout: Updating mozilla/nsprpub/pr/include/obsolete
cvs checkout: Updating mozilla/nsprpub/pr/include/private
cvs checkout: Updating mozilla/nsprpub/pr/src
cvs checkout: Updating mozilla/nsprpub/pr/src/bthreads
cvs checkout: Updating mozilla/nsprpub/pr/src/cplus
cvs checkout: Updating mozilla/nsprpub/pr/src/cplus/tests
cvs checkout: Updating mozilla/nsprpub/pr/src/cthreads
cvs checkout: Updating mozilla/nsprpub/pr/src/io
cvs checkout: Updating mozilla/nsprpub/pr/src/linking
cvs checkout: Updating mozilla/nsprpub/pr/src/malloc
cvs checkout: Updating mozilla/nsprpub/pr/src/md
cvs checkout: Updating mozilla/nsprpub/pr/src/md/beos
cvs checkout: Updating mozilla/nsprpub/pr/src/md/mac
cvs checkout: Updating mozilla/nsprpub/pr/src/md/os2
cvs checkout: Updating mozilla/nsprpub/pr/src/md/unix
cvs checkout: Updating mozilla/nsprpub/pr/src/md/windows
cvs checkout: Updating mozilla/nsprpub/pr/src/memory
cvs checkout: Updating mozilla/nsprpub/pr/src/misc
cvs checkout: Updating mozilla/nsprpub/pr/src/pthreads
cvs checkout: Updating mozilla/nsprpub/pr/src/threads
cvs checkout: Updating mozilla/nsprpub/pr/src/threads/combined
cvs checkout: Updating mozilla/nsprpub/pr/tests
cvs checkout: Updating mozilla/nsprpub/pr/tests/dll
cvs checkout: Updating mozilla/nsprpub/pr/tests/macbuild
cvs checkout: Updating mozilla/nsprpub/pr/tests/w16gui
cvs checkout: Updating mozilla/nsprpub/tools
TB [2012-11-27 18:52:13] CVS checkout mozilla/nsprpub PASSED
TB [2012-11-27 18:52:13] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/dbm
cvs checkout: Updating mozilla/dbm
cvs checkout: Updating mozilla/dbm/include
cvs checkout: Updating mozilla/dbm/macbuild
cvs checkout: Updating mozilla/dbm/src
cvs checkout: Updating mozilla/dbm/tests
TB [2012-11-27 18:52:13] CVS checkout mozilla/dbm PASSED
TB [2012-11-27 18:52:13] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/security/dbm
cvs checkout: Updating mozilla/security/dbm
cvs checkout: Updating mozilla/security/dbm/config
cvs checkout: Updating mozilla/security/dbm/include
cvs checkout: Updating mozilla/security/dbm/src
cvs checkout: Updating mozilla/security/dbm/tests
TB [2012-11-27 18:52:14] CVS checkout mozilla/security/dbm PASSED
TB [2012-11-27 18:52:14] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/security/coreconf
cvs checkout: Updating mozilla/security/coreconf
cvs checkout: Updating mozilla/security/coreconf/mkdepend
cvs checkout: Updating mozilla/security/coreconf/nsinstall
TB [2012-11-27 18:52:15] CVS checkout mozilla/security/coreconf PASSED
TB [2012-11-27 18:52:15] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/security/nss
cvs checkout: Updating mozilla/security/nss
cvs checkout: Updating mozilla/security/nss/build
cvs checkout: Updating mozilla/security/nss/build/autoconf
cvs checkout: Updating mozilla/security/nss/build/unix
cvs checkout: Updating mozilla/security/nss/cmd
cvs checkout: Updating mozilla/security/nss/cmd/SSLsample
cvs checkout: Updating mozilla/security/nss/cmd/SSLsample/client
cvs checkout: Updating mozilla/security/nss/cmd/SSLsample/server
cvs checkout: Updating mozilla/security/nss/cmd/addbuiltin
cvs checkout: Updating mozilla/security/nss/cmd/atob
cvs checkout: Updating mozilla/security/nss/cmd/bltest
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_cfb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_ctr
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_cts
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_gcm
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/camellia_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/camellia_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/des3_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/des3_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/des_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/des_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/dsa
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/ecdsa
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/md2
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/md5
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc2_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc2_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc4
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc5_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc5_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rsa
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/seed_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/seed_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha1
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha224
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha256
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha384
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha512
cvs checkout: Updating mozilla/security/nss/cmd/btoa
cvs checkout: Updating mozilla/security/nss/cmd/certcgi
cvs checkout: Updating mozilla/security/nss/cmd/certutil
cvs checkout: Updating mozilla/security/nss/cmd/cgi
cvs checkout: Updating mozilla/security/nss/cmd/checkcert
cvs checkout: Updating mozilla/security/nss/cmd/chktest
cvs checkout: Updating mozilla/security/nss/cmd/cipher
cvs checkout: Updating mozilla/security/nss/cmd/cmdlib
cvs checkout: Updating mozilla/security/nss/cmd/crlutil
cvs checkout: Updating mozilla/security/nss/cmd/crmf-cgi
cvs checkout: Updating mozilla/security/nss/cmd/crmftest
cvs checkout: Updating mozilla/security/nss/cmd/dbck
cvs checkout: Updating mozilla/security/nss/cmd/dbdump
cvs checkout: Updating mozilla/security/nss/cmd/dbtest
cvs checkout: Updating mozilla/security/nss/cmd/derdump
cvs checkout: Updating mozilla/security/nss/cmd/digest
cvs checkout: Updating mozilla/security/nss/cmd/doc
cvs checkout: Updating mozilla/security/nss/cmd/ecperf
cvs checkout: Updating mozilla/security/nss/cmd/fipstest
cvs checkout: Updating mozilla/security/nss/cmd/httpserv
cvs checkout: Updating mozilla/security/nss/cmd/ilock
cvs checkout: Updating mozilla/security/nss/cmd/include
cvs checkout: Updating mozilla/security/nss/cmd/keyutil
cvs checkout: Updating mozilla/security/nss/cmd/lib
cvs checkout: Updating mozilla/security/nss/cmd/libpkix
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/perf
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/perf/libpkix_buildthreads
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/perf/nss_threads
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/certsel
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/certsel/certselector
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/certsel/comcertselparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/checker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/crlsel
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/crlsel/comcrlselparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/crlsel/crlselector
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/buildparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/procparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/resourcelimits
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/trustanchor
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/valparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results/buildresult
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results/policynode
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results/valresult
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results/verifynode
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/store
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/basicchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/bc_checker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/buildchain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/buildchain_partialchain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/buildchain_resourcelimits
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/buildchain_uchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/customcrlchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/defaultcrlchecker2
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/ocspchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/policychecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/subjaltnamechecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/validatechain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/validatechain_NB
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/validatechain_bc
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/certchain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/error
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/list
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/list2
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/logger
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/colcertstore
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/ekuchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/httpcertstore
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/pk11certstore
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/socket
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/authorityinfoaccess
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/cert
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/certdp
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/crl
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/crlentry
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/date
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/generalname
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/issuingdp
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/nameconstraints
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/subjectinfoaccess
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/x500name
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/bigint
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/bytearray
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/hashtable
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/mem
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/monitorlock
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/mutex
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/mutex2
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/mutex3
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/object
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/oid
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/rwlock
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/stress
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/string
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/string2
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkixutil
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps/build_chain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps/dumpcert
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps/dumpcrl
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps/validate_chain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/testutil
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/testwrapper
cvs checkout: Updating mozilla/security/nss/cmd/listsuites
cvs checkout: Updating mozilla/security/nss/cmd/lowhashtest
cvs checkout: Updating mozilla/security/nss/cmd/makepqg
cvs checkout: Updating mozilla/security/nss/cmd/modutil
cvs checkout: Updating mozilla/security/nss/cmd/multinit
cvs checkout: Updating mozilla/security/nss/cmd/nssutil
cvs checkout: Updating mozilla/security/nss/cmd/ocspclnt
cvs checkout: Updating mozilla/security/nss/cmd/ocspresp
cvs checkout: Updating mozilla/security/nss/cmd/oidcalc
cvs checkout: Updating mozilla/security/nss/cmd/p7content
cvs checkout: Updating mozilla/security/nss/cmd/p7env
cvs checkout: Updating mozilla/security/nss/cmd/p7sign
cvs checkout: Updating mozilla/security/nss/cmd/p7verify
cvs checkout: Updating mozilla/security/nss/cmd/pemtest
cvs checkout: Updating mozilla/security/nss/cmd/pemtests
cvs checkout: Updating mozilla/security/nss/cmd/pemutil
cvs checkout: Updating mozilla/security/nss/cmd/pk11info
cvs checkout: Updating mozilla/security/nss/cmd/pk11mode
cvs checkout: Updating mozilla/security/nss/cmd/pk11util
cvs checkout: Updating mozilla/security/nss/cmd/pk11util/scripts
cvs checkout: Updating mozilla/security/nss/cmd/pk12util
cvs checkout: Updating mozilla/security/nss/cmd/pk1sign
cvs checkout: Updating mozilla/security/nss/cmd/pkiutil
cvs checkout: Updating mozilla/security/nss/cmd/pkix-errcodes
cvs checkout: Updating mozilla/security/nss/cmd/pp
cvs checkout: Updating mozilla/security/nss/cmd/ppcertdata
cvs checkout: Updating mozilla/security/nss/cmd/preenc
cvs checkout: Updating mozilla/security/nss/cmd/psmmsgs
cvs checkout: Updating mozilla/security/nss/cmd/pwdecrypt
cvs checkout: Updating mozilla/security/nss/cmd/regress
cvs checkout: Updating mozilla/security/nss/cmd/replacer
cvs checkout: Updating mozilla/security/nss/cmd/reporter
cvs checkout: Updating mozilla/security/nss/cmd/reporter/tests
cvs checkout: Updating mozilla/security/nss/cmd/revoker
cvs checkout: Updating mozilla/security/nss/cmd/rsaperf
cvs checkout: Updating mozilla/security/nss/cmd/rsaperflo
cvs checkout: Updating mozilla/security/nss/cmd/rsapoptst
cvs checkout: Updating mozilla/security/nss/cmd/samples
cvs checkout: Updating mozilla/security/nss/cmd/sdrtest
cvs checkout: Updating mozilla/security/nss/cmd/selfserv
cvs checkout: Updating mozilla/security/nss/cmd/shexp
cvs checkout: Updating mozilla/security/nss/cmd/shlibsign
cvs checkout: Updating mozilla/security/nss/cmd/shlibsign/mangle
cvs checkout: Updating mozilla/security/nss/cmd/signtool
cvs checkout: Updating mozilla/security/nss/cmd/signver
cvs checkout: Updating mozilla/security/nss/cmd/signver/examples
cvs checkout: Updating mozilla/security/nss/cmd/signver/examples/1
cvs checkout: Updating mozilla/security/nss/cmd/smimetools
cvs checkout: Updating mozilla/security/nss/cmd/sslstrength
cvs checkout: Updating mozilla/security/nss/cmd/ssltap
cvs checkout: Updating mozilla/security/nss/cmd/stopselfserv
cvs checkout: Updating mozilla/security/nss/cmd/strsclnt
cvs checkout: Updating mozilla/security/nss/cmd/swfort
cvs checkout: Updating mozilla/security/nss/cmd/swfort/instinit
cvs checkout: Updating mozilla/security/nss/cmd/swfort/newuser
cvs checkout: Updating mozilla/security/nss/cmd/symkeyutil
cvs checkout: Updating mozilla/security/nss/cmd/sysinit
cvs checkout: Updating mozilla/security/nss/cmd/tests
cvs checkout: Updating mozilla/security/nss/cmd/tstclnt
cvs checkout: Updating mozilla/security/nss/cmd/ttformat
cvs checkout: Updating mozilla/security/nss/cmd/vfychain
cvs checkout: Updating mozilla/security/nss/cmd/vfyserv
cvs checkout: Updating mozilla/security/nss/cmd/zlib
cvs checkout: Updating mozilla/security/nss/coverage
cvs checkout: Updating mozilla/security/nss/lib
cvs checkout: Updating mozilla/security/nss/lib/asn1
cvs checkout: Updating mozilla/security/nss/lib/base
cvs checkout: Updating mozilla/security/nss/lib/certdb
cvs checkout: Updating mozilla/security/nss/lib/certhigh
cvs checkout: Updating mozilla/security/nss/lib/ckfw
cvs checkout: Updating mozilla/security/nss/lib/ckfw/builtins
cvs checkout: Updating mozilla/security/nss/lib/ckfw/capi
cvs checkout: Updating mozilla/security/nss/lib/ckfw/dbm
cvs checkout: Updating mozilla/security/nss/lib/ckfw/nssmkey
cvs checkout: Updating mozilla/security/nss/lib/ckfw/pem
cvs checkout: Updating mozilla/security/nss/lib/crmf
cvs checkout: Updating mozilla/security/nss/lib/cryptohi
U mozilla/security/nss/lib/cryptohi/seckey.c
cvs checkout: Updating mozilla/security/nss/lib/dev
cvs checkout: Updating mozilla/security/nss/lib/fortcrypt
cvs checkout: Updating mozilla/security/nss/lib/fortcrypt/libci
cvs checkout: Updating mozilla/security/nss/lib/fortcrypt/swfort
cvs checkout: Updating mozilla/security/nss/lib/fortcrypt/swfort/pkcs11
cvs checkout: Updating mozilla/security/nss/lib/freebl
cvs checkout: Updating mozilla/security/nss/lib/freebl/ecl
U mozilla/security/nss/lib/freebl/ecl/ecl-curve.h
cvs checkout: Updating mozilla/security/nss/lib/freebl/ecl/tests
cvs checkout: Updating mozilla/security/nss/lib/freebl/mpi
cvs checkout: Updating mozilla/security/nss/lib/freebl/mpi/doc
cvs checkout: Updating mozilla/security/nss/lib/freebl/mpi/tests
cvs checkout: Updating mozilla/security/nss/lib/freebl/mpi/utils
cvs checkout: Updating mozilla/security/nss/lib/freebl/tfm
cvs checkout: Updating mozilla/security/nss/lib/freebl/tfm/demo
cvs checkout: Updating mozilla/security/nss/lib/freebl/tfm/mtest
cvs checkout: Updating mozilla/security/nss/lib/hash
cvs checkout: Updating mozilla/security/nss/lib/jar
cvs checkout: Updating mozilla/security/nss/lib/libpkix
cvs checkout: Updating mozilla/security/nss/lib/libpkix/include
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/certsel
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/checker
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/crlsel
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/params
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/results
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/store
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/top
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/util
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/module
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki/SunOS5.10_DBG.OBJ
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki/SunOS5.10_i86pc_gcc_DBG.OBJ
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/system
cvs checkout: Updating mozilla/security/nss/lib/macbuild
cvs checkout: Updating mozilla/security/nss/lib/macbuild/NSS
cvs checkout: Updating mozilla/security/nss/lib/macbuild/NSS/NSS
cvs checkout: Updating mozilla/security/nss/lib/nss
U mozilla/security/nss/lib/nss/utilwrap.c
cvs checkout: Updating mozilla/security/nss/lib/pk11wrap
U mozilla/security/nss/lib/pk11wrap/pk11cxt.c
U mozilla/security/nss/lib/pk11wrap/pk11obj.c
U mozilla/security/nss/lib/pk11wrap/pk11pub.h
cvs checkout: Updating mozilla/security/nss/lib/pkcs12
cvs checkout: Updating mozilla/security/nss/lib/pkcs7
U mozilla/security/nss/lib/pkcs7/p7decode.c
U mozilla/security/nss/lib/pkcs7/secpkcs7.h
cvs checkout: Updating mozilla/security/nss/lib/pki
cvs checkout: Updating mozilla/security/nss/lib/pki/doc
cvs checkout: Updating mozilla/security/nss/lib/pki1
cvs checkout: Updating mozilla/security/nss/lib/pkix
cvs checkout: Updating mozilla/security/nss/lib/pkix/doc
cvs checkout: Updating mozilla/security/nss/lib/pkix/include
cvs checkout: Updating mozilla/security/nss/lib/pkix/src
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AccessDescription
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AdministrationDomainName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AlgorithmIdentifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AnotherName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Attribute
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AttributeTypeAndValue
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AuthorityInfoAccessSyntax
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AuthorityKeyIdentifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/BasicConstraints
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/BuiltInDomainDefinedAttribute
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/BuiltInDomainDefinedAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/BuiltInStandardAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CPSuri
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CRLDistPointsSyntax
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Certificate
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CertificateList
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CertificatePolicies
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CommonName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CountryName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/DirectoryString
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/DisplayText
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/DistributionPoint
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/DistributionPointName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/EDIPartyName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ExtKeyUsageSyntax
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ExtendedNetworkAddress
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ExtensionAttribute
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ExtensionAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/GeneralName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/GeneralNames
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/GeneralSubtree
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/GeneralSubtrees
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/IssuingDistributionPoint
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/KeyUsage
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Name
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/NameConstraints
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/NetworkAddress
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/NoticeReference
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/NumericUserIdentifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ORAddress
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/OrganizationName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/OrganizationalUnitName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/OrganizationalUnitNames
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PDSName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PDSParameter
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PersonalName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PhysicalDeliveryCountryName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Pkcs9email
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PolicyConstraints
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PolicyInformation
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PolicyMappings
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PolicyQualifierInfo
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PostalCode
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PrivateDomainName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PrivateKeyUsagePeriod
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/RDNSequence
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ReasonFlags
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/RelativeDistinguishedName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/SubjectDirectoryAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/SubjectPublicKeyInfo
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TBSCertList
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TBSCertificate
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexCommonName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexDomainDefinedAttribute
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexDomainDefinedAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexOrganizationName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexOrganizationalUnitName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexOrganizationalUnitNames
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexPersonalName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TerminalIdentifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Time
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/UserNotice
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Validity
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X121Address
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520CommonName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520LocalityName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520Name
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520OrganizationName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520OrganizationalUnitName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520StateOrProvinceName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520Title
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520countryName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520dnQualifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/e1634Address
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/policyMapping
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/revokedCertificate
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/revokedCertificates
cvs checkout: Updating mozilla/security/nss/lib/pkix/test
cvs checkout: Updating mozilla/security/nss/lib/rdb
cvs checkout: Updating mozilla/security/nss/lib/smime
cvs checkout: Updating mozilla/security/nss/lib/softoken
cvs checkout: Updating mozilla/security/nss/lib/softoken/legacydb
cvs checkout: Updating mozilla/security/nss/lib/sqlite
cvs checkout: Updating mozilla/security/nss/lib/ssl
cvs checkout: Updating mozilla/security/nss/lib/sysinit
cvs checkout: Updating mozilla/security/nss/lib/util
U mozilla/security/nss/lib/util/base64.h
U mozilla/security/nss/lib/util/nssb64d.c
cvs checkout: Updating mozilla/security/nss/lib/zlib
cvs checkout: Updating mozilla/security/nss/lib/zlib/patches
cvs checkout: Updating mozilla/security/nss/macbuild
cvs checkout: Updating mozilla/security/nss/pkg
cvs checkout: Updating mozilla/security/nss/pkg/linux
cvs checkout: Updating mozilla/security/nss/pkg/solaris
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWnss3
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtls
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtls-devl
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsd
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsdx
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsu
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsux
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsx
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsx-devl
cvs checkout: Updating mozilla/security/nss/pkg/solaris/common_files
cvs checkout: Updating mozilla/security/nss/ppcertdata
cvs checkout: Updating mozilla/security/nss/tests
cvs checkout: Updating mozilla/security/nss/tests/bltest
cvs checkout: Updating mozilla/security/nss/tests/cert
cvs checkout: Updating mozilla/security/nss/tests/chains
cvs checkout: Updating mozilla/security/nss/tests/chains/ocspd-config
cvs checkout: Updating mozilla/security/nss/tests/chains/scenarios
cvs checkout: Updating mozilla/security/nss/tests/cipher
cvs checkout: Updating mozilla/security/nss/tests/cmdtests
cvs checkout: Updating mozilla/security/nss/tests/common
cvs checkout: Updating mozilla/security/nss/tests/crmf
cvs checkout: Updating mozilla/security/nss/tests/dbtests
cvs checkout: Updating mozilla/security/nss/tests/dbupgrade
cvs checkout: Updating mozilla/security/nss/tests/doc
cvs checkout: Updating mozilla/security/nss/tests/fips
cvs checkout: Updating mozilla/security/nss/tests/iopr
cvs checkout: Updating mozilla/security/nss/tests/iopr/cgi-bin
cvs checkout: Updating mozilla/security/nss/tests/iopr/server_scr
cvs checkout: Updating mozilla/security/nss/tests/libpkix
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/extKeyUsage
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/generalName
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/keyIdentifier
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/keyUsage
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/publicKey
cvs checkout: Updating mozilla/security/nss/tests/libpkix/common
cvs checkout: Updating mozilla/security/nss/tests/libpkix/libpkix
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/module
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/pki
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/pki/rev_data
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/pki/rev_data/local
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/system
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/certsel
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/checker
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/crlsel
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/params
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/results
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/store
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking/signature
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/fail
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/pass
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/single_path
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/fail
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/pass
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/test1
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/test2
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/test3
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data/crlchecker
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data/multiple_certstores
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data/multiple_certstores/store1
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data/multiple_certstores/store2
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/util
cvs checkout: Updating mozilla/security/nss/tests/libpkix/sample_apps
cvs checkout: Updating mozilla/security/nss/tests/lowhash
cvs checkout: Updating mozilla/security/nss/tests/memleak
cvs checkout: Updating mozilla/security/nss/tests/merge
cvs checkout: Updating mozilla/security/nss/tests/multinit
cvs checkout: Updating mozilla/security/nss/tests/ocsp
cvs checkout: Updating mozilla/security/nss/tests/pem
cvs checkout: Updating mozilla/security/nss/tests/perf
cvs checkout: Updating mozilla/security/nss/tests/pkcs11
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites/security
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites/security/pkcs11
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites/security/ssl
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites/security/ssl/AIX4.3_DBG.OBJ
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/trivial
cvs checkout: Updating mozilla/security/nss/tests/pkits
cvs checkout: Updating mozilla/security/nss/tests/sdr
cvs checkout: Updating mozilla/security/nss/tests/smime
cvs checkout: Updating mozilla/security/nss/tests/ssl
cvs checkout: Updating mozilla/security/nss/tests/stan
cvs checkout: Updating mozilla/security/nss/tests/stan/client
cvs checkout: Updating mozilla/security/nss/tests/stan/server
cvs checkout: Updating mozilla/security/nss/tests/tools
TB [2012-11-27 18:52:19] CVS checkout mozilla/security/nss PASSED
TB [2012-11-27 18:52:19] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/security/jss
cvs checkout: Updating mozilla/security/jss
cvs checkout: Updating mozilla/security/jss/cmd
cvs checkout: Updating mozilla/security/jss/cmd/jssjava
cvs checkout: Updating mozilla/security/jss/com
cvs checkout: Updating mozilla/security/jss/config
cvs checkout: Updating mozilla/security/jss/lib
cvs checkout: Updating mozilla/security/jss/org
cvs checkout: Updating mozilla/security/jss/org/mozilla
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/SecretDecoderRing
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/asn1
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/crypto
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/crypto_native
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/fips181
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/hclhacks
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/manage
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkcs10
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkcs11
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkcs12
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkcs7
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/cert
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/cmc
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/cmmf
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/cms
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/crmf
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/primitive
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider/java
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider/java/security
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider/javax
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider/javax/crypto
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/ssl
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/tests
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/util
cvs checkout: Updating mozilla/security/jss/pkg
cvs checkout: Updating mozilla/security/jss/pkg/linux
cvs checkout: Updating mozilla/security/jss/pkg/solaris
cvs checkout: Updating mozilla/security/jss/pkg/solaris/ROOT-SunOS5.8_DBG.OBJ
cvs checkout: Updating mozilla/security/jss/pkg/solaris/SUNWjss
cvs checkout: Updating mozilla/security/jss/pkg/solaris/SUNWjss3
cvs checkout: Updating mozilla/security/jss/pkg/solaris/SUNWjssx
cvs checkout: Updating mozilla/security/jss/pkg/solaris/common_files
cvs checkout: Updating mozilla/security/jss/samples
TB [2012-11-27 18:52:20] CVS checkout mozilla/security/jss PASSED
TB [2012-11-27 18:52:20] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A -r NSS_3_11_1_RTM mozilla/security/nss/lib/freebl/ecl/ecl-curve.h
U mozilla/security/nss/lib/freebl/ecl/ecl-curve.h
TB [2012-11-27 18:52:22] CVS checkout -r NSS_3_11_1_RTM mozilla/security/nss/lib/freebl/ecl/ecl-curve.h PASSED
TB [2012-11-27 18:52:22] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot stat mozilla
TB [2012-11-27 18:52:24] CVS stat mozilla PASSED
- Repository revision:1.69/cvsroot/mozilla/security/nss/lib/cryptohi/seckey.c,v
+ Repository revision:1.70/cvsroot/mozilla/security/nss/lib/cryptohi/seckey.c,v
- Repository revision:1.7/cvsroot/mozilla/security/nss/lib/nss/utilwrap.c,v
+ Repository revision:1.8/cvsroot/mozilla/security/nss/lib/nss/utilwrap.c,v
- Repository revision:1.9/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11cxt.c,v
+ Repository revision:1.10/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11cxt.c,v
- Repository revision:1.28/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11obj.c,v
+ Repository revision:1.29/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11obj.c,v
- Repository revision:1.41/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11pub.h,v
+ Repository revision:1.42/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11pub.h,v
- Repository revision:1.29/cvsroot/mozilla/security/nss/lib/pkcs7/p7decode.c,v
+ Repository revision:1.30/cvsroot/mozilla/security/nss/lib/pkcs7/p7decode.c,v
- Repository revision:1.9/cvsroot/mozilla/security/nss/lib/pkcs7/secpkcs7.h,v
+ Repository revision:1.10/cvsroot/mozilla/security/nss/lib/pkcs7/secpkcs7.h,v
- Repository revision:1.4/cvsroot/mozilla/security/nss/lib/util/base64.h,v
+ Repository revision:1.5/cvsroot/mozilla/security/nss/lib/util/base64.h,v
- Repository revision:1.9/cvsroot/mozilla/security/nss/lib/util/nssb64d.c,v
+ Repository revision:1.10/cvsroot/mozilla/security/nss/lib/util/nssb64d.c,v
TB [2012-11-27 18:52:25] CVS change detected
TinderboxPrint:CVS change
TB [2012-11-27 18:52:26] $ cd /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG
TB [2012-11-27 18:52:26] ######## NSS - build - 64 bits - DBG ########
TB [2012-11-27 18:52:26] $ cd /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss
TB [2012-11-27 18:52:26] $ gmake clean nss_build_all
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
cd lib; gmake clean
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
cd util; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/util'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/quickder.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secdig.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derenc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dersubr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertime.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/errstrs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssb64d.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssb64e.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssrwlk.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssilock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidstring.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/portreg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secalgid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1d.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1e.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1u.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secitem.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secload.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secoid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sectime.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secport.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/templates.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utf8.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilmod.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilpars.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/util'
cd freebl; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/freebl'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libfreebl.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libfreebl3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/loader.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/freebl'
cd sqlite; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sqlite'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sqlite3.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sqlite'
cd softoken; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ecdecode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipsaudt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstokn.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgglue.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowpbe.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/padbuf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11c.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11u.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsawrapr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkpars.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkpwd.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/softkver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tlsprf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jpakesftk.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
cd legacydb; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken/legacydb'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbmshim.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/keydb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgattr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgcreate.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgdestroy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgfind.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lginit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pcertdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11db.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken/legacydb'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken'
cd base; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/base'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssb.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/arena.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/error.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/errorval.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hashops.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tracker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/item.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utf8.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/list.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/base'
cd dev; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/dev'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdev.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devslot.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devtoken.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ckhelper.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/dev'
cd pki; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pki'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsspki.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/asymmkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certificate.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cryptocontext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symmkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/trustdomain.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tdcache.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdecode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkistore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkibase.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pki3hack.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pki'
cd libpkix; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
cd include; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/include'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/include'
cd pkix; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
cd certsel; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcertsel.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_certselector.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_comcertselparams.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcrlsel.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_crlselector.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_comcrlselparams.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixchecker.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_basicconstraintschecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_certchainchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_crlchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_ekuchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_expirationchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_namechainingchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_nameconstraintschecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_ocspchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_revocationmethod.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_revocationchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_policychecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_signaturechecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_targetcertchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixparams.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_trustanchor.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_procparams.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_valparams.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_resourcelimits.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixresults.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_buildresult.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_policynode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_valresult.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_verifynode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixstore.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_store.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixtop.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_validate.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_lifecycle.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_build.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixutil.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_tools.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_error.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_logger.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_list.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_errpaths.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix'
cd pkix_pl_nss; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
cd pki; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixpki.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_basicconstraints.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_cert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicyinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicymap.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicyqualifier.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crldp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crlentry.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_date.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_generalname.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_infoaccess.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_nameconstraints.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocsprequest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocspresponse.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_publickey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_x500name.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocspcertid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixsystem.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_bigint.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_bytearray.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_common.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_error.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_hashtable.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_lifecycle.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_mem.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_monitorlock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_mutex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_object.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_oid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_primhash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_rwlock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_string.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixmodule.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_aiamgr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_colcertstore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_httpcertstore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_httpdefaultclient.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldaptemplates.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapcertstore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapresponse.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldaprequest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapdefaultclient.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_nsscontext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_pk11certstore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_socket.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix'
cd certdb; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certdb'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcertdb.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/alg1485.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certv3.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certxutl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/genname.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/stanpcertdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/polcyxtn.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secname.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xauthkid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xbsconst.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xconst.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certdb'
cd certhigh; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certhigh'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcerthi.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certhtml.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certreq.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlv2.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocsp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspsig.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certhigh.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfypkix.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfypkixprint.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xcrldist.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certhigh'
cd pk11wrap; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pk11wrap'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpk11wrap.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dev3hack.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11akey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11auth.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11cert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11cxt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11err.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11kea.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11list.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11load.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mech.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11merge.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11nobj.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11obj.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pars.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pbe.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pk12.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pqg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11sdr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11skey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11slot.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11util.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pk11wrap'
cd cryptohi; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/cryptohi'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcryptohi.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sechash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/seckey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secsign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secvfy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dsautil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/cryptohi'
cd nss; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/nss'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssinit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilwrap.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/nss'
cd ssl; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ssl'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derive.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dtlscon.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/prelib.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3con.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3gthr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslauth.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslcon.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssldef.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslenum.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslerr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslerrstrs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslinit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3ext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslgathr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslmutex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslnonce.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslreveal.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsecur.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsnce.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltrace.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/authcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmpcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3ecc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/unix_err.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ssl'
cd pkcs12; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs12'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs12.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12local.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12creat.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12dec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12plcy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12tmpl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12e.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12d.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs12'
cd pkcs7; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs7'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs7.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certread.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7common.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7create.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7decode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7encode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7local.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmime.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs7'
cd smime; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/smime'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsarray.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsasn1.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsattr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmscinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmscipher.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdecode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdigdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdigest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsencdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsencode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsenvdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsmessage.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmspubkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsrecinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsreclist.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmssigdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmssiginfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsudf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimemessage.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimeutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimever.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/smime'
cd crmf; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/crmf'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcrmf.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfenc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmftmpl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfreq.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfpop.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfdec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfget.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfcont.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfasn1.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfresp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfrec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfchal.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/servget.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/respcli.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/respcmn.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/challcli.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/asn1cmn.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/crmf'
cd jar; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/jar'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libjar.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarsign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jar.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jar-ds.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarfile.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarint.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/jar'
cd ckfw; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckfw.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crypto.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/find.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/instance.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mutex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/object.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/session.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sessobj.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/slot.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/token.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/wrap.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mechanism.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
cd builtins; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw/builtins'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckbi.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/anchor.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/constants.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bfind.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/binst.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bobject.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bsession.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bslot.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoken.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ckbiver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw/builtins'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw'
cd sysinit; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sysinit'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsssysinit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sysinit'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib'
cd cmd; gmake clean
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
cd lib; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lib'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsectool.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/basicutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secpwd.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derprint.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/moreoids.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pppolicy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ffs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11table.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lib'
cd addbuiltin; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/addbuiltin'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/addbuiltin Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/addbuiltin.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/addbuiltin'
cd atob; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/atob'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/atob Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/atob.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/atob'
cd bltest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/bltest'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bltest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/blapitest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/bltest'
cd btoa; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/btoa'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoa Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoa.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/btoa'
cd certcgi; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certcgi'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certcgi Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certcgi.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certcgi'
cd certutil; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certutil'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certutil Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/keystuff.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certutil'
cd checkcert; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/checkcert'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/checkcert Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/checkcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/checkcert'
cd chktest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/chktest'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/chktest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/chktest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/chktest'
cd crlutil; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crlutil'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlutil Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlgen_lex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlgen.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crlutil'
cd crmftest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crmftest'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmftest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/testcrmf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crmftest'
cd dbtest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/dbtest'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbtest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbtest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/dbtest'
cd derdump; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/derdump'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdump Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdump.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/derdump'
cd digest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/digest'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/digest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/digest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/digest'
cd httpserv; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/httpserv'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/httpserv Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/httpserv.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/httpserv'
cd fipstest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/fipstest'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/fipstest'
cd lowhashtest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lowhashtest'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowhashtest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowhashtest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lowhashtest'
cd listsuites; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/listsuites'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/listsuites Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/listsuites.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/listsuites'
cd makepqg; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/makepqg'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/makepqg Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/makepqg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/makepqg'
cd multinit; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/multinit'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/multinit Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/multinit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/multinit'
cd ocspclnt; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspclnt'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspclnt Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspclnt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspclnt'
cd ocspresp; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspresp'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspresp Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspresp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspresp'
cd oidcalc; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/oidcalc'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidcalc Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidcalc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/oidcalc'
cd p7content; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7content'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7content Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7content.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7content'
cd p7env; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7env'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7env Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7env.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7env'
cd p7sign; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7sign'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7sign Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7sign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7sign'
cd p7verify; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7verify'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7verify Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7verify.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7verify'
cd pk12util; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk12util'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk12util Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk12util.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk12util'
cd pk11mode; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk11mode'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mode Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk11mode'
cd pk1sign; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk1sign'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk1sign Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk1sign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk1sign'
cd pkix-errcodes; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pkix-errcodes'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix-errcodes Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix-errcodes.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pkix-errcodes'
cd pp; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pp'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pp Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pp'
cd pwdecrypt; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pwdecrypt'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pwdecrypt Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pwdecrypt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pwdecrypt'
cd rsaperf; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/rsaperf'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsaperf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsaperf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/defkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/rsaperf'
cd sdrtest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/sdrtest'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdrtest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdrtest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/sdrtest'
cd selfserv; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/selfserv'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/selfserv Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/selfserv.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/selfserv'
cd signtool; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signtool'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signtool Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signtool.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certgen.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/javascript.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/list.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/util.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/verify.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/zip.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signtool'
cd signver; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signver'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signver Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk7print.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signver'
cd shlibsign; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.chk ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.chk
cd mangle; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/mangle'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mangle Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mangle.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/mangle'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign'
cd smimetools; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/smimetools'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/smimetools'
cd ssltap; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ssltap'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltap Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltap.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ssltap'
cd strsclnt; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/strsclnt'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/strsclnt Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/strsclnt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/strsclnt'
cd symkeyutil; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/symkeyutil'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symkeyutil Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symkeyutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/symkeyutil'
cd tests; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tests'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/baddbdir Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/conflict Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertimetest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encodeinttest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nonspr10 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/remtest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmodtest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/baddbdir.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/conflict.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertimetest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encodeinttest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nonspr10.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/remtest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmodtest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tests'
cd tstclnt; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tstclnt'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tstclnt Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tstclnt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tstclnt'
cd vfychain; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfychain'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfychain Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfychain.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfychain'
cd vfyserv; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfyserv'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyserv Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyserv.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfyserv'
cd modutil; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/modutil'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/modutil Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/modutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/instsec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/install.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/installparse.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/install-ds.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lex.Pk11Install_yy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core so_locations
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/modutil'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd'
gmake -C ../coreconf
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/coreconf'
cd nsinstall; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/coreconf/nsinstall'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/coreconf/nsinstall'
cd nsinstall; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/coreconf/nsinstall'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf nsinstall.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pathsub.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf pathsub.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pathsub.o -lpthread -ldl -lc
true -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall ../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/coreconf/nsinstall'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/coreconf'
../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -D ../../nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ
cd ../../nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ ; \
sh ../configure \
--enable-64bit \
--with-dist-prefix='/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ' \
--with-dist-includedir='/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include'
creating cache ./config.cache
checking host system type... x86_64-unknown-linux-gnu
checking target system type... x86_64-unknown-linux-gnu
checking build system type... x86_64-unknown-linux-gnu
checking for whoami... /usr/bin/whoami
checking for gcc... gcc
checking whether the C compiler (gcc ) works... yes
checking whether the C compiler (gcc ) is a cross-compiler... no
checking whether we are using GNU C... yes
checking whether gcc accepts -g... yes
checking how to run the C preprocessor... gcc -E
checking for ranlib... ranlib
checking for as... /usr/bin/as
checking for ar... /usr/bin/ar
checking for ld... /usr/bin/ld
checking for strip... /usr/bin/strip
checking for windres... no
checking for gcc -pipe support... no
checking whether C compiler supports -fprofile-generate... yes
checking for visibility(hidden) attribute... yes
checking for visibility pragma support... yes
checking for perl5... no
checking for perl... /usr/bin/perl
checking for dlopen in -ldl... yes
checking for dlfcn.h... yes
checking whether gcc needs -traditional... no
checking for lchown... yes
checking for strerror... yes
checking for dladdr... yes
checking for pthread_create in -lpthreads... no
checking for pthread_create in -lpthread... yes
checking whether gcc accepts -pthread... yes
updating cache ./config.cache
creating ./config.status
creating Makefile
creating config/Makefile
creating config/autoconf.mk
creating config/nsprincl.mk
creating config/nsprincl.sh
creating config/nspr-config
creating config/nspr.pc
creating lib/Makefile
creating lib/ds/Makefile
creating lib/libc/Makefile
creating lib/libc/include/Makefile
creating lib/libc/src/Makefile
creating lib/tests/Makefile
creating pkg/Makefile
creating pr/Makefile
creating pr/include/Makefile
creating pr/include/md/Makefile
creating pr/include/obsolete/Makefile
creating pr/include/private/Makefile
creating pr/src/Makefile
creating pr/src/io/Makefile
creating pr/src/linking/Makefile
creating pr/src/malloc/Makefile
creating pr/src/md/Makefile
creating pr/src/md/unix/Makefile
creating pr/src/memory/Makefile
creating pr/src/misc/Makefile
creating pr/src/threads/Makefile
creating pr/tests/Makefile
creating pr/tests/dll/Makefile
creating pkg/linux/Makefile
creating pr/src/pthreads/Makefile
gmake -C ../../nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ'
gmake -C config export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/config'
gcc -o now.o -c -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM ../../config/now.c
gcc now.o -o now
gcc -o nsinstall.o -c -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM ../../config/nsinstall.c
gcc nsinstall.o -o nsinstall
rm -f nfspwd; cp ../../config/nfspwd.pl nfspwd; chmod +x nfspwd
rm -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin/nspr-config
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/config'
gmake -C pr export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr'
gmake -C include export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/include'
gmake -C md export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/include/md'
../../../config/./nsinstall -R -m 444 ../../../../pr/include/md/_openbsd.cfg ../../../../pr/include/md/_winnt.cfg ../../../../pr/include/md/_nto.cfg ../../../../pr/include/md/_riscos.cfg ../../../../pr/include/md/_dgux.cfg ../../../../pr/include/md/_aix32.cfg ../../../../pr/include/md/_hpux64.cfg ../../../../pr/include/md/_os2.cfg ../../../../pr/include/md/_linux.cfg ../../../../pr/include/md/_qnx.cfg ../../../../pr/include/md/_darwin.cfg ../../../../pr/include/md/_beos.cfg ../../../../pr/include/md/_irix32.cfg ../../../../pr/include/md/_irix64.cfg ../../../../pr/include/md/_win95.cfg ../../../../pr/include/md/_netbsd.cfg ../../../../pr/include/md/_solaris.cfg ../../../../pr/include/md/_unixware7.cfg ../../../../pr/include/md/_freebsd.cfg ../../../../pr/include/md/_scoos.cfg ../../../../pr/include/md/_osf1.cfg ../../../../pr/include/md/_unixware.cfg ../../../../pr/include/md/_aix64.cfg ../../../../pr/include/md/_symbian.cfg ../../../../pr/include/md/_hpux32.cfg ../../../../pr/include/md/_bsdi.cfg /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include/md
../../../config/./nsinstall -R -m 444 ../../../../pr/include/md/_linux.cfg /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include
mv -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include/_linux.cfg /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include/prcpucfg.h
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/include/md'
gmake -C private export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/include/private'
../../../config/./nsinstall -R -m 444 ../../../../pr/include/private/pprio.h ../../../../pr/include/private/pprthred.h ../../../../pr/include/private/prpriv.h /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include/private
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/include/private'
gmake -C obsolete export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/include/obsolete'
../../../config/./nsinstall -R -m 444 ../../../../pr/include/obsolete/pralarm.h ../../../../pr/include/obsolete/probslet.h ../../../../pr/include/obsolete/protypes.h ../../../../pr/include/obsolete/prsem.h /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include/obsolete
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/include/obsolete'
../../config/./nsinstall -R -m 444 ../../../pr/include/prmon.h ../../../pr/include/prmwait.h ../../../pr/include/prrng.h ../../../pr/include/prprf.h ../../../pr/include/prtypes.h ../../../pr/include/prenv.h ../../../pr/include/prlink.h ../../../pr/include/prdtoa.h ../../../pr/include/prolock.h ../../../pr/include/prtrace.h ../../../pr/include/prlog.h ../../../pr/include/prproces.h ../../../pr/include/prsystem.h ../../../pr/include/prinet.h ../../../pr/include/prinrval.h ../../../pr/include/prmem.h ../../../pr/include/prtime.h ../../../pr/include/prwin16.h ../../../pr/include/prcmon.h ../../../pr/include/prtpool.h ../../../pr/include/prshm.h ../../../pr/include/prerr.h ../../../pr/include/prcountr.h ../../../pr/include/prclist.h ../../../pr/include/prerror.h ../../../pr/include/prcvar.h ../../../pr/include/prio.h ../../../pr/include/prrwlock.h ../../../pr/include/prlock.h ../../../pr/include/prinit.h ../../../pr/include/pratom.h ../../../pr/include/prpdce.h ../../../pr/include/prlong.h ../../../pr/include/prshma.h ../../../pr/include/prvrsion.h ../../../pr/include/nspr.h ../../../pr/include/pripcsem.h ../../../pr/include/prnetdb.h ../../../pr/include/prthread.h ../../../pr/include/prbit.h /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/include'
gmake -C src export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src'
gmake -C io export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/io'
gcc -o prfdcach.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/io/prfdcach.c
gcc -o prmwait.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/io/prmwait.c
gcc -o priometh.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/io/priometh.c
gcc -o pripv6.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/io/pripv6.c
gcc -o prmapopt.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/io/prmapopt.c
gcc -o prlayer.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/io/prlayer.c
gcc -o prlog.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/io/prlog.c
gcc -o prmmap.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/io/prmmap.c
gcc -o prpolevt.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/io/prpolevt.c
gcc -o prprf.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/io/prprf.c
gcc -o prscanf.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/io/prscanf.c
gcc -o prstdio.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/io/prstdio.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/io'
gmake -C linking export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/linking'
gcc -o prlink.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/linking/prlink.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/linking'
gmake -C malloc export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/malloc'
gcc -o prmalloc.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/malloc/prmalloc.c
gcc -o prmem.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/malloc/prmem.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/malloc'
gmake -C md export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/md'
gmake -C unix export
gmake[5]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/md/unix'
gcc -o unix.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private ../../../../../pr/src/md/unix/unix.c
gcc -o unix_errors.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private ../../../../../pr/src/md/unix/unix_errors.c
gcc -o uxproces.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private ../../../../../pr/src/md/unix/uxproces.c
gcc -o uxrng.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private ../../../../../pr/src/md/unix/uxrng.c
gcc -o uxshm.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private ../../../../../pr/src/md/unix/uxshm.c
gcc -o uxwrap.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private ../../../../../pr/src/md/unix/uxwrap.c
gcc -o linux.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private ../../../../../pr/src/md/unix/linux.c
gcc -o os_Linux_x86_64.o -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private -c ../../../../../pr/src/md/unix/os_Linux_x86_64.s
gmake[5]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/md/unix'
gcc -o prosdep.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include ../../../../pr/src/md/prosdep.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/md'
gmake -C memory export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/memory'
gcc -o prseg.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/memory/prseg.c
gcc -o prshm.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/memory/prshm.c
gcc -o prshma.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/memory/prshma.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/memory'
gmake -C misc export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/misc'
gcc -o pralarm.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/pralarm.c
gcc -o pratom.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/pratom.c
gcc -o prcountr.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prcountr.c
gcc -o prdtoa.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prdtoa.c
gcc -o prenv.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prenv.c
../../../../pr/src/misc/prenv.c: In function PR_SetEnv:
../../../../pr/src/misc/prenv.c:64:5: warning: passing argument 1 of putenv discards const qualifier from pointer target type [enabled by default]
In file included from /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include/prmem.h:15:0,
from /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include/nspr.h:26,
from ../../../../pr/include/private/primpl.h:39,
from ../../../../pr/src/misc/prenv.c:7:
/usr/include/stdlib.h:579:12: note: expected char * but argument is of type const char *
gcc -o prerr.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prerr.c
gcc -o prerror.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prerror.c
gcc -o prerrortable.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prerrortable.c
gcc -o prinit.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prinit.c
gcc -o prinrval.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prinrval.c
gcc -o pripc.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/pripc.c
gcc -o prlog2.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prlog2.c
gcc -o prlong.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prlong.c
gcc -o prnetdb.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prnetdb.c
../../../../pr/src/misc/prnetdb.c: In function pr_NetAddrToStringGNI:
../../../../pr/src/misc/prnetdb.c:2255:14: warning: variable md_af set but not used [-Wunused-but-set-variable]
gcc -o praton.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/praton.c
gcc -o prolock.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prolock.c
gcc -o prrng.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prrng.c
gcc -o prsystem.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prsystem.c
gcc -o prtime.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prtime.c
gcc -o prthinfo.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prthinfo.c
gcc -o prtpool.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prtpool.c
gcc -o prtrace.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/misc/prtrace.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/misc'
gmake -C threads export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/threads'
gcc -o prcmon.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/threads/prcmon.c
gcc -o prrwlock.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/threads/prrwlock.c
gcc -o prtpd.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/threads/prtpd.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/threads'
gmake -C pthreads export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/pthreads'
gcc -o ptio.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/pthreads/ptio.c
../../../../pr/src/pthreads/ptio.c: In function pt_Connect:
../../../../pr/src/pthreads/ptio.c:1545:11: warning: variable md_af set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptio.c: In function pt_Bind:
../../../../pr/src/pthreads/ptio.c:1735:11: warning: variable md_af set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptio.c: In function pt_SendTo:
../../../../pr/src/pthreads/ptio.c:1992:11: warning: variable md_af set but not used [-Wunused-but-set-variable]
gcc -o ptsynch.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/pthreads/ptsynch.c
gcc -o ptthread.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/pthreads/ptthread.c
gcc -o ptmisc.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private ../../../../pr/src/pthreads/ptmisc.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/pthreads'
gmake build
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src'
gcc -o prvrsion.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../pr/include -I../../../pr/include/private -I. ../../../pr/src/prvrsion.c
../../../pr/src/prvrsion.c: In function libVersionPoint:
../../../pr/src/prvrsion.c:84:17: warning: variable dummy set but not used [-Wunused-but-set-variable]
rm -f libnspr4.a
/usr/bin/ar cr libnspr4.a ./prvrsion.o io/./prfdcach.o io/./prmwait.o io/./prmapopt.o io/./priometh.o io/./pripv6.o io/./prlayer.o io/./prlog.o io/./prmmap.o io/./prpolevt.o io/./prprf.o io/./prscanf.o io/./prstdio.o threads/./prcmon.o threads/./prrwlock.o threads/./prtpd.o linking/./prlink.o malloc/./prmalloc.o malloc/./prmem.o md/./prosdep.o memory/./prshm.o memory/./prshma.o memory/./prseg.o misc/./pralarm.o misc/./pratom.o misc/./prcountr.o misc/./prdtoa.o misc/./prenv.o misc/./prerr.o misc/./prerror.o misc/./prerrortable.o misc/./prinit.o misc/./prinrval.o misc/./pripc.o misc/./prlog2.o misc/./prlong.o misc/./prnetdb.o misc/./praton.o misc/./prolock.o misc/./prrng.o misc/./prsystem.o misc/./prthinfo.o misc/./prtpool.o misc/./prtrace.o misc/./prtime.o pthreads/./ptsynch.o pthreads/./ptio.o pthreads/./ptthread.o pthreads/./ptmisc.o md/unix/./unix.o md/unix/./unix_errors.o md/unix/./uxproces.o md/unix/./uxrng.o md/unix/./uxshm.o md/unix/./uxwrap.o md/unix/./linux.o md/unix/./os_Linux_x86_64.o
ranlib libnspr4.a
rm -f libnspr4.so
gcc -shared -Wl,-soname -Wl,libnspr4.so -o libnspr4.so ./prvrsion.o io/./prfdcach.o io/./prmwait.o io/./prmapopt.o io/./priometh.o io/./pripv6.o io/./prlayer.o io/./prlog.o io/./prmmap.o io/./prpolevt.o io/./prprf.o io/./prscanf.o io/./prstdio.o threads/./prcmon.o threads/./prrwlock.o threads/./prtpd.o linking/./prlink.o malloc/./prmalloc.o malloc/./prmem.o md/./prosdep.o memory/./prshm.o memory/./prshma.o memory/./prseg.o misc/./pralarm.o misc/./pratom.o misc/./prcountr.o misc/./prdtoa.o misc/./prenv.o misc/./prerr.o misc/./prerror.o misc/./prerrortable.o misc/./prinit.o misc/./prinrval.o misc/./pripc.o misc/./prlog2.o misc/./prlong.o misc/./prnetdb.o misc/./praton.o misc/./prolock.o misc/./prrng.o misc/./prsystem.o misc/./prthinfo.o misc/./prtpool.o misc/./prtrace.o misc/./prtime.o pthreads/./ptsynch.o pthreads/./ptio.o pthreads/./ptthread.o pthreads/./ptmisc.o md/unix/./unix.o md/unix/./unix_errors.o md/unix/./uxproces.o md/unix/./uxrng.o md/unix/./uxshm.o md/unix/./uxwrap.o md/unix/./linux.o md/unix/./os_Linux_x86_64.o -lpthread -ldl -lrt
../../config/./nsinstall -R -m 444 ./libnspr4.a ./libnspr4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../config/./nsinstall -R -m 444 ./libnspr4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr'
gmake -C lib export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib'
gmake -C ds export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/ds'
gcc -o plarena.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../pr/include ../../../lib/ds/plarena.c
gcc -o plhash.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../pr/include ../../../lib/ds/plhash.c
gcc -o plvrsion.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../pr/include -I. ../../../lib/ds/plvrsion.c
../../../lib/ds/plvrsion.c: In function libVersionPoint:
../../../lib/ds/plvrsion.c:84:17: warning: variable dummy set but not used [-Wunused-but-set-variable]
rm -f libplds4.a
/usr/bin/ar cr libplds4.a ./plarena.o ./plhash.o ./plvrsion.o
ranlib libplds4.a
rm -f libplds4.so
gcc -shared -Wl,-soname -Wl,libplds4.so -o libplds4.so ./plarena.o ./plhash.o ./plvrsion.o -L/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnspr4
../../config/./nsinstall -R -m 444 ../../../lib/ds/plarenas.h ../../../lib/ds/plarena.h ../../../lib/ds/plhash.h /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include
../../config/./nsinstall -R -m 444 ./libplds4.a ./libplds4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../config/./nsinstall -R -m 444 ./libplds4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/ds'
gmake -C libc export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libc'
gmake -C include export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libc/include'
../../../config/./nsinstall -R -m 444 ../../../../lib/libc/include/plbase64.h ../../../../lib/libc/include/plstr.h ../../../../lib/libc/include/plgetopt.h ../../../../lib/libc/include/plerror.h /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libc/include'
gmake -C src export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libc/src'
gcc -o plvrsion.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I. ../../../../lib/libc/src/plvrsion.c
../../../../lib/libc/src/plvrsion.c: In function libVersionPoint:
../../../../lib/libc/src/plvrsion.c:84:17: warning: variable dummy set but not used [-Wunused-but-set-variable]
gcc -o strlen.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include ../../../../lib/libc/src/strlen.c
gcc -o strcpy.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include ../../../../lib/libc/src/strcpy.c
gcc -o strdup.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include ../../../../lib/libc/src/strdup.c
gcc -o strcase.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include ../../../../lib/libc/src/strcase.c
gcc -o strcat.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include ../../../../lib/libc/src/strcat.c
gcc -o strcmp.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include ../../../../lib/libc/src/strcmp.c
gcc -o strchr.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include ../../../../lib/libc/src/strchr.c
gcc -o strpbrk.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include ../../../../lib/libc/src/strpbrk.c
gcc -o strstr.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include ../../../../lib/libc/src/strstr.c
gcc -o strtok.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include ../../../../lib/libc/src/strtok.c
gcc -o base64.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include ../../../../lib/libc/src/base64.c
gcc -o plerror.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include ../../../../lib/libc/src/plerror.c
gcc -o plgetopt.o -c -fvisibility=hidden -Wall -pthread -g -fno-inline -fPIC -UNDEBUG -DDEBUG_tinderbox -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include ../../../../lib/libc/src/plgetopt.c
rm -f libplc4.a
/usr/bin/ar cr libplc4.a ./plvrsion.o ./strlen.o ./strcpy.o ./strdup.o ./strcase.o ./strcat.o ./strcmp.o ./strchr.o ./strpbrk.o ./strstr.o ./strtok.o ./base64.o ./plerror.o ./plgetopt.o
ranlib libplc4.a
rm -f libplc4.so
gcc -shared -Wl,-soname -Wl,libplc4.so -o libplc4.so ./plvrsion.o ./strlen.o ./strcpy.o ./strdup.o ./strcase.o ./strcat.o ./strcmp.o ./strchr.o ./strpbrk.o ./strstr.o ./strtok.o ./base64.o ./plerror.o ./plgetopt.o -L/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnspr4
../../../config/./nsinstall -R -m 444 ./libplc4.a ./libplc4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../config/./nsinstall -R -m 444 ./libplc4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libc/src'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libc'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ'
gmake -C ../dbm export libs
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm'
cd include; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm/include'
Creating ../../../dist/public/dbm
../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 ../../../dbm/include/cdefs.h ../../../dbm/include/mcom_db.h ../../../dbm/include/ncompat.h ../../../dbm/include/winfile.h ../../../dist/public/dbm
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm/include'
cd src; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm/src'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm/src'
cd include; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm/include'
gmake[2]: Nothing to be done for `libs'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm/include'
cd src; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm/src'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/db.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include ../../../dbm/src/db.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/h_bigkey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include ../../../dbm/src/h_bigkey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/h_func.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include ../../../dbm/src/h_func.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/h_log2.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include ../../../dbm/src/h_log2.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/h_page.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include ../../../dbm/src/h_page.c
../../../dbm/src/h_page.c: In function __get_page:
../../../dbm/src/h_page.c:727:8: warning: variable is_little_endian set but not used [-Wunused-but-set-variable]
../../../dbm/src/h_page.c:732:8: warning: variable is_big_endian set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include ../../../dbm/src/hash.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash_buf.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include ../../../dbm/src/hash_buf.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mktemp.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include ../../../dbm/src/mktemp.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dirent.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include dirent.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libdbm.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libdbm.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/db.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/h_bigkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/h_func.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/h_log2.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/h_page.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash_buf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mktemp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dirent.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libdbm.a
../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libdbm.a ../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm/src'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm'
cd lib; gmake export
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib'
cd util; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/util'
Creating ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 base64.h ciferfam.h hasht.h nssb64.h nssb64t.h nsslocks.h nssilock.h nssilckt.h nssrwlk.h nssrwlkt.h nssutil.h pkcs11.h pkcs11f.h pkcs11p.h pkcs11t.h pkcs11n.h pkcs11u.h portreg.h secasn1.h secasn1t.h seccomon.h secder.h secdert.h secdig.h secdigt.h secitem.h secoid.h secoidt.h secport.h secerr.h utilmodt.h utilrename.h utilpars.h utilparst.h ../../../../dist/public/nss
Creating ../../../../dist/private/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 templates.c ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/util'
cd freebl; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/freebl'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 blapit.h shsign.h ecl/ecl-exp.h nsslowhash.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 alghmac.h blapi.h secmpi.h secrng.h ec.h ecl/ecl.h ecl/ecl-curve.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/freebl'
cd sqlite; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sqlite'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 sqlite3.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sqlite'
cd softoken; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken'
cd legacydb; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken/legacydb'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken/legacydb'
cd legacydb; gmake private_export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken/legacydb'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken/legacydb'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 lgglue.h lowkeyi.h lowkeyti.h pkcs11ni.h softoken.h softoknt.h softkver.h sdb.h sftkdbt.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken'
cd base; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/base'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 baset.h base.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/base'
cd dev; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/dev'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/dev'
cd pki; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pki'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pki'
cd libpkix; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix'
cd include; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/include'
../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/include'
cd pkix; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix'
cd certsel; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
cd certsel; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix'
cd pkix_pl_nss; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
cd pki; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
cd pki; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
cd include; gmake private_export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/include'
../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/include'
cd pkix; gmake private_export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix'
cd certsel; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix'
cd pkix_pl_nss; gmake private_export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
cd pki; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
There are no private exports.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix'
cd certdb; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certdb'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certdb'
cd certhigh; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certhigh'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certhigh'
cd pk11wrap; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pk11wrap'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 secmod.h secmodt.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pk11wrap'
cd cryptohi; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/cryptohi'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h sechash.h ../../../../dist/public/nss
There are no private exports.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/cryptohi'
cd nss; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/nss'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 nss.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 nssrenam.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/nss'
cd ssl; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ssl'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h ../../../../dist/public/nss
There are no private exports.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ssl'
cd pkcs12; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs12'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h ../../../../dist/public/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs12'
cd pkcs7; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs7'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h ../../../../dist/public/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs7'
cd smime; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/smime'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h ../../../../dist/public/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/smime'
cd crmf; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/crmf'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/crmf'
cd jar; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/jar'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h ../../../../dist/public/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/jar'
cd ckfw; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw'
cd builtins; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw/builtins'
../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../../dist/public/nss
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw/builtins'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h ../../../../dist/public/nss
cd builtins; gmake private_export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw/builtins'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw/builtins'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw'
cd sysinit; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sysinit'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sysinit'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib'
cd cmd; gmake export
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd'
cd lib; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lib'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 basicutil.h secutil.h pk11table.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lib'
cd addbuiltin; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/addbuiltin'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/addbuiltin'
cd atob; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/atob'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/atob'
cd bltest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/bltest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/bltest'
cd btoa; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/btoa'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/btoa'
cd certcgi; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certcgi'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certcgi'
cd certutil; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certutil'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certutil'
cd checkcert; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/checkcert'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/checkcert'
cd chktest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/chktest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/chktest'
cd crlutil; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crlutil'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crlutil'
cd crmftest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crmftest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crmftest'
cd dbtest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/dbtest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/dbtest'
cd derdump; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/derdump'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/derdump'
cd digest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/digest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/digest'
cd httpserv; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/httpserv'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/httpserv'
cd fipstest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/fipstest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/fipstest'
cd lowhashtest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lowhashtest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lowhashtest'
cd listsuites; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/listsuites'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/listsuites'
cd makepqg; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/makepqg'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/makepqg'
cd multinit; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/multinit'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/multinit'
cd ocspclnt; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspclnt'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspclnt'
cd ocspresp; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspresp'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspresp'
cd oidcalc; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/oidcalc'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/oidcalc'
cd p7content; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7content'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7content'
cd p7env; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7env'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7env'
cd p7sign; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7sign'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7sign'
cd p7verify; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7verify'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7verify'
cd pk12util; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk12util'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk12util'
cd pk11mode; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk11mode'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk11mode'
cd pk1sign; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk1sign'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk1sign'
cd pkix-errcodes; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pkix-errcodes'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pkix-errcodes'
cd pp; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pp'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pp'
cd pwdecrypt; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pwdecrypt'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pwdecrypt'
cd rsaperf; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/rsaperf'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/rsaperf'
cd sdrtest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/sdrtest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/sdrtest'
cd selfserv; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/selfserv'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/selfserv'
cd signtool; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signtool'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signtool'
cd signver; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signver'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signver'
cd shlibsign; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign'
cd mangle; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/mangle'
gmake[3]: Nothing to be done for `export'.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/mangle'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign'
cd smimetools; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/smimetools'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/smimetools'
cd ssltap; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ssltap'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ssltap'
cd strsclnt; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/strsclnt'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/strsclnt'
cd symkeyutil; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/symkeyutil'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/symkeyutil'
cd tests; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tests'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tests'
cd tstclnt; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tstclnt'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tstclnt'
cd vfychain; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfychain'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfychain'
cd vfyserv; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfyserv'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfyserv'
cd modutil; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/modutil'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/modutil'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd'
cd lib; gmake libs
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib'
cd util; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/util'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/quickder.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss quickder.c
quickder.c: In function DecodeItem:
quickder.c:611:12: warning: variable optional set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secdig.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss secdig.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdec.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss derdec.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derenc.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss derenc.c
derenc.c: In function der_encode:
derenc.c:282:22: warning: variable optional set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dersubr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss dersubr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertime.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss dertime.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/errstrs.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss errstrs.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssb64d.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss nssb64d.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssb64e.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss nssb64e.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssrwlk.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss nssrwlk.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssilock.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss nssilock.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidstring.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss oidstring.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/portreg.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss portreg.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secalgid.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss secalgid.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1d.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss secasn1d.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1e.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss secasn1e.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1u.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss secasn1u.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secitem.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss secitem.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secload.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss secload.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secoid.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss secoid.c
secoid.c: In function secoid_HashNumber:
secoid.c:1866:12: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
secoid.c: In function SECOID_Init:
secoid.c:1907:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sectime.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sectime.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secport.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss secport.c
secport.c: In function port_ArenaRelease:
secport.c:431:29: warning: variable tm set but not used [-Wunused-but-set-variable]
secport.c: In function PORT_ArenaUnmark_Util:
secport.c:501:25: warning: variable tm set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/templates.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss templates.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utf8.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss utf8.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilmod.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss utilmod.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilpars.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss utilpars.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/quickder.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secdig.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derenc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dersubr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertime.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/errstrs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssb64d.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssb64e.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssrwlk.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssilock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidstring.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/portreg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secalgid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1d.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1e.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1u.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secitem.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secload.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secoid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sectime.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secport.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/templates.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utf8.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilmod.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilpars.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil.a
grep -v ';-' nssutil.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssutil.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil3.so
gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnssutil3.so -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssutil.def -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/quickder.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secdig.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derenc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dersubr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertime.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/errstrs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssb64d.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssb64e.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssrwlk.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssilock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidstring.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/portreg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secalgid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1d.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1e.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1u.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secitem.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secload.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secoid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sectime.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secport.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/templates.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utf8.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilmod.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilpars.o -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil3.so
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil3.so ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/util'
cd freebl; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/freebl'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/loader.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl loader.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libfreebl.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libfreebl.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/loader.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libfreebl.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libfreebl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
mkdir Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB
gmake FREEBL_CHILD_BUILD=1 \
OBJDIR=Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/freebl'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/freeblver.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl freeblver.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ldvector.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ldvector.c
ldvector.c: In function FREEBL_GetVector:
ldvector.c:273:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/sysrand.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl sysrand.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/sha_fast.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl sha_fast.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/md2.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl md2.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/md5.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl md5.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/sha512.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl sha512.c
sha512.c: In function SHA512_Compress:
sha512.c:895:14: warning: unused variable t1 [-Wunused-variable]
sha512.c: In function SHA512_End:
sha512.c:1190:14: warning: unused variable t1 [-Wunused-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/alghmac.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl alghmac.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/rawhash.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl rawhash.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/alg2268.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl alg2268.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/arcfour.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl arcfour.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/arcfive.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl arcfive.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/desblapi.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -fno-strict-aliasing desblapi.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/des.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl des.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/drbg.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl drbg.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/cts.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl cts.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ctr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ctr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/gcm.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl gcm.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/rijndael.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl rijndael.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl aeskeywrap.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/camellia.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl camellia.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/dh.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl dh.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ec.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/pqg.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl pqg.c
pqg.c: In function pqg_ParamGen:
pqg.c:1234:18: warning: variable b set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/dsa.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl dsa.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/rsa.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl rsa.c
rsa.c: In function get_blinding_params:
rsa.c:1098:26: warning: variable prevbp set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/shvfy.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl shvfy.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl tlsprfalg.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/seed.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl seed.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/jpake.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl jpake.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpprime.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl mpi/mpprime.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpmontg.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl mpi/mpmontg.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mplogic.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl mpi/mplogic.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpi.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl mpi/mpi.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl mpi/mp_gf2m.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpi_amd64.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl mpi/mpi_amd64.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mp_comba.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl mpi/mp_comba.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl mpi/mpcpucache.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecl.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ecl.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ecl_curve.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ecl_mult.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ecl_gf.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ecp_aff.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ecp_jac.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ecp_mont.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec_naf.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ec_naf.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ecp_jm.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_aff.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ec2_aff.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_mont.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ec2_mont.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_proj.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ec2_proj.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_163.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ec2_163.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_193.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ec2_193.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_233.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ec2_233.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_192.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ecp_192.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_224.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ecp_224.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_256.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ecp_256.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_384.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ecp_384.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_521.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl ecl/ecp_521.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/stubs.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl stubs.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl nsslowhash.c
nsslowhash.c: In function NSSLOW_Init:
nsslowhash.c:292:12: warning: variable nsprAvailable set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/arcfour-amd64-gas.o -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -march=opteron -m64 -fPIC -Wa,--noexecstack -c arcfour-amd64-gas.s
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpi_amd64_gas.o -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -march=opteron -m64 -fPIC -Wa,--noexecstack -c mpi/mpi_amd64_gas.s
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/intel-aes.o -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -march=opteron -m64 -fPIC -Wa,--noexecstack -c intel-aes.s
grep -v ';-' freebl_hash.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/freebl.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libfreebl3.so -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/freebl.def -Wl,-Bsymbolic -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/freeblver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ldvector.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/sysrand.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/sha_fast.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/md2.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/md5.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/sha512.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/alghmac.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/rawhash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/alg2268.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/arcfour.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/arcfive.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/desblapi.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/des.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/drbg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/cts.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ctr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/gcm.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/rijndael.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/camellia.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/dh.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/pqg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/dsa.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/rsa.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/shvfy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/seed.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/jpake.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpprime.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpmontg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mplogic.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpi.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpi_amd64.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mp_comba.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec_naf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_aff.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_mont.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_proj.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_163.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_193.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_233.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_192.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_224.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_256.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_384.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_521.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/stubs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/arcfour-amd64-gas.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpi_amd64_gas.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/intel-aes.o -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/freebl'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/freebl'
cd sqlite; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sqlite'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sqlite3.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSQLITE_THREADSAFE=1 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sqlite3.c
sqlite3.c: In function pagerPagecount:
sqlite3.c:39133:7: warning: variable rc set but not used [-Wunused-but-set-variable]
sqlite3.c: In function balance_nonroot:
sqlite3.c:43586:11: warning: variable t set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3ValueText:
sqlite3.c:46992:32: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
sqlite3.c: In function sqlite3VdbeAddOp4Int:
sqlite3.c:47358:33: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
sqlite3.c: In function sqlite3VdbeChangeP4:
sqlite3.c:47872:18: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
sqlite3.c: In function sqlite3VdbeRecordUnpack:
sqlite3.c:49877:17: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
sqlite3.c: In function columnMem:
sqlite3.c:50866:7: warning: variable vals set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3_blob_open:
sqlite3.c:58242:40: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
sqlite3.c: In function sqlite3DeleteIndex:
sqlite3.c:66581:10: warning: variable pOld set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3RefillIndex:
sqlite3.c:68544:29: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
sqlite3.c: In function sqlite3CommitTransaction:
sqlite3.c:69556:12: warning: variable db set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3RollbackTransaction:
sqlite3.c:69576:12: warning: variable db set but not used [-Wunused-but-set-variable]
sqlite3.c: In function trimFunc:
sqlite3.c:72032:14: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
sqlite3.c: In function sqlite3FkCheck:
sqlite3.c:73225:9: warning: variable v set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3OpenTable:
sqlite3.c:73762:31: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
sqlite3.c: In function sqlite3Insert:
sqlite3.c:74197:7: warning: variable regRecord set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3GenerateConstraintChecks:
sqlite3.c:75068:35: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
sqlite3.c: In function sqlite3_get_table:
sqlite3.c:83425:22: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
sqlite3.c: In function sqlite3_free_table:
sqlite3.c:83469:10: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
sqlite3.c: In function sqlite3Update:
sqlite3.c:84700:7: warning: variable regRec set but not used [-Wunused-but-set-variable]
sqlite3.c: In function codeOneLoopStart:
sqlite3.c:89777:16: warning: variable pFinal set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3WhereBegin:
sqlite3.c:90410:30: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
sqlite3.c: In function sqlite3Parser:
sqlite3.c:93894:7: warning: variable yyendofinput set but not used [-Wunused-but-set-variable]
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sqlite3.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite.a
grep -v ';-' sqlite.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sqlite.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite3.so
gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libsqlite3.so -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sqlite.def -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sqlite3.o -lpthread -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite3.so
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite3.so ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sqlite'
cd softoken; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ecdecode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss ecdecode.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipsaudt.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss fipsaudt.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss fipstest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstokn.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss fipstokn.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgglue.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss lgglue.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowkey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss lowkey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowpbe.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss lowpbe.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/padbuf.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss padbuf.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pkcs11.c
pkcs11.c: In function sftk_HashNumber:
pkcs11.c:2135:12: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
pkcs11.c: In function NSC_GetInfo:
pkcs11.c:3059:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11c.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pkcs11c.c
pkcs11c.c: In function NSC_GenerateKeyPair:
pkcs11c.c:3836:9: warning: variable private_value_bits set but not used [-Wunused-but-set-variable]
pkcs11c.c: In function sftk_PackagePrivateKey:
pkcs11c.c:4358:14: warning: variable fordebug set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11u.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pkcs11u.c
pkcs11u.c: In function sftk_NewTokenObject:
pkcs11u.c:1902:22: warning: variable tokObject set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsawrapr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss rsawrapr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdb.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sdb.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkdb.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sftkdb.c
sftkdb.c: In function sftkdb_fixupTemplateOut:
sftkdb.c:328:22: warning: variable data set but not used [-Wunused-but-set-variable]
sftkdb.c: In function sftkdb_CreateObject:
sftkdb.c:576:12: warning: variable inTransaction set but not used [-Wunused-but-set-variable]
sftkdb.c: In function sftkdb_handleIDAndName:
sftkdb.c:2014:11: warning: variable crv set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkpars.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sftkpars.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkpwd.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sftkpwd.c
sftkpwd.c: In function sftk_updateMacs:
sftkpwd.c:868:11: warning: variable crv2 set but not used [-Wunused-but-set-variable]
sftkpwd.c:867:11: warning: variable crv set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/softkver.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss softkver.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tlsprf.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss tlsprf.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jpakesftk.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss jpakesftk.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ecdecode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipsaudt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstokn.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgglue.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowpbe.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/padbuf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11c.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11u.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsawrapr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkpars.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkpwd.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/softkver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tlsprf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jpakesftk.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn.a
grep -v ';-' softokn.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/softokn.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn3.so
gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libsoftokn3.so -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/softokn.def -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ecdecode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipsaudt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstokn.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgglue.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowpbe.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/padbuf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11c.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11u.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsawrapr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkpars.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkpwd.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/softkver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tlsprf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jpakesftk.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn3.so
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn3.so ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
cd legacydb; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken/legacydb'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbmshim.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm dbmshim.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/keydb.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm keydb.c
keydb.c: In function seckey_encrypt_private_key:
keydb.c:1480:14: warning: variable fordebug set but not used [-Wunused-but-set-variable]
keydb.c: In function seckey_decrypt_private_key:
keydb.c:1709:14: warning: variable fordebug set but not used [-Wunused-but-set-variable]
keydb.c: In function encodePWCheckEntry:
keydb.c:1994:15: warning: variable rv set but not used [-Wunused-but-set-variable]
keydb.c: In function nsslowkey_ResetKeyDB:
keydb.c:2036:9: warning: variable ret set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Get:
keydb.c:2093:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Put:
keydb.c:2111:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Sync:
keydb.c:2129:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Del:
keydb.c:2147:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Seq:
keydb.c:2165:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Close:
keydb.c:2183:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgattr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm lgattr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgcreate.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm lgcreate.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgdestroy.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm lgdestroy.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgfind.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm lgfind.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lginit.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm lginit.c
lginit.c: In function lg_HashNumber:
lginit.c:486:12: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
lginit.c: In function lg_CompareValues:
lginit.c:492:27: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
lginit.c:493:27: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
lginit.c: In function legacy_Open:
lginit.c:597:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm lgutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowcert.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm lowcert.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowkey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm lowkey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pcertdb.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm pcertdb.c
pcertdb.c: In function certdb_Get:
pcertdb.c:229:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function certdb_Put:
pcertdb.c:245:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function certdb_Sync:
pcertdb.c:261:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function certdb_Del:
pcertdb.c:278:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function certdb_Seq:
pcertdb.c:299:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function certdb_Close:
pcertdb.c:315:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function NewDBSubjectEntry:
pcertdb.c:2435:18: warning: variable eaddrlen set but not used [-Wunused-but-set-variable]
pcertdb.c: In function UpdateV6DB:
pcertdb.c:3591:15: warning: variable rv set but not used [-Wunused-but-set-variable]
pcertdb.c: In function UpdateV5DB:
pcertdb.c:3796:15: warning: variable rv set but not used [-Wunused-but-set-variable]
pcertdb.c: In function nsslowcert_FindCrlByKey:
pcertdb.c:5075:9: warning: variable key set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11db.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm pk11db.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbmshim.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/keydb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgattr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgcreate.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgdestroy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgfind.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lginit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pcertdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11db.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm.a
grep -v ';-' nssdbm.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssdbm.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm3.so
gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnssdbm3.so -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssdbm.def -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbmshim.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/keydb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgattr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgcreate.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgdestroy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgfind.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lginit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pcertdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11db.o ../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a ../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a -L../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -L../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm3.so
../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm.a ../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm3.so ../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken/legacydb'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken'
cd base; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/base'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/arena.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr arena.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/error.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr error.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/errorval.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr errorval.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hashops.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr hashops.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libc.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr libc.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tracker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr tracker.c
tracker.c: In function identity_hash:
tracker.c:36:10: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/item.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr item.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utf8.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr utf8.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/list.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr list.c
list.c: In function nssList_Add:
list.c:224:14: warning: variable nssrv set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr hash.c
hash.c: In function nss_identity_hash:
hash.c:58:16: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssb.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssb.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/arena.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/error.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/errorval.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hashops.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tracker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/item.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utf8.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/list.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssb.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/base'
cd dev; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/dev'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devslot.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr devslot.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devtoken.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr devtoken.c
devtoken.c: In function nssToken_TraverseCertificates:
devtoken.c:1473:14: warning: variable status set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr devutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ckhelper.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr ckhelper.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdev.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdev.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devslot.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devtoken.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ckhelper.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdev.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdev.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/dev'
cd pki; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pki'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/asymmkey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr asymmkey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certificate.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr certificate.c
certificate.c: In function nssCertificateList_DoCallback:
certificate.c:902:14: warning: variable nssrv set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cryptocontext.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr cryptocontext.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symmkey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr symmkey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/trustdomain.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr trustdomain.c
trustdomain.c: In function NSSTrustDomain_TraverseCertificates:
trustdomain.c:1002:14: warning: variable status set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tdcache.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr tdcache.c
tdcache.c: In function merge_object_instances:
tdcache.c:704:49: warning: comparison between PRStatus and enum _SECStatus [-Wenum-compare]
tdcache.c: In function add_cert_to_cache:
tdcache.c:776:9: warning: variable handle set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdecode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr certdecode.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkistore.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr pkistore.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkibase.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr pkibase.c
pkibase.c: In function nssPKIObjectCollection_Traverse:
pkibase.c:910:14: warning: variable status set but not used [-Wunused-but-set-variable]
pkibase.c: In function nssCertificateCollection_Create:
pkibase.c:1064:14: warning: variable status set but not used [-Wunused-but-set-variable]
pkibase.c: In function nssCRLCollection_Create:
pkibase.c:1171:14: warning: variable status set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pki3hack.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr pki3hack.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsspki.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsspki.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/asymmkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certificate.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cryptocontext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symmkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/trustdomain.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tdcache.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdecode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkistore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkibase.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pki3hack.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsspki.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pki'
cd libpkix; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix'
cd include; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/include'
gmake[3]: Nothing to be done for `libs'.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/include'
cd pkix; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix'
cd certsel; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_certselector.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_certselector.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_comcertselparams.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_comcertselparams.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcertsel.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcertsel.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_certselector.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_comcertselparams.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcertsel.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcertsel.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_crlselector.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_crlselector.c
pkix_crlselector.c: In function pkix_CRLSelector_Hashcode:
pkix_crlselector.c:193:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_comcrlselparams.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_comcrlselparams.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcrlsel.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcrlsel.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_crlselector.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_comcrlselparams.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcrlsel.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcrlsel.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_basicconstraintschecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_basicconstraintschecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_certchainchecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_certchainchecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_crlchecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_crlchecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_ekuchecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_ekuchecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_expirationchecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_expirationchecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_namechainingchecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_namechainingchecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_nameconstraintschecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_nameconstraintschecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_ocspchecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_ocspchecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_revocationmethod.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_revocationmethod.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_revocationchecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_revocationchecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_policychecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_policychecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_signaturechecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_signaturechecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_targetcertchecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_targetcertchecker.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixchecker.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixchecker.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_basicconstraintschecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_certchainchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_crlchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_ekuchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_expirationchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_namechainingchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_nameconstraintschecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_ocspchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_revocationmethod.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_revocationchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_policychecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_signaturechecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_targetcertchecker.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixchecker.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixchecker.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_trustanchor.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_trustanchor.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_procparams.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_procparams.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_valparams.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_valparams.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_resourcelimits.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_resourcelimits.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixparams.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixparams.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_trustanchor.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_procparams.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_valparams.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_resourcelimits.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixparams.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixparams.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_buildresult.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_buildresult.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_policynode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_policynode.c
pkix_policynode.c: In function pkix_PolicyNode_Hashcode:
pkix_policynode.c:827:34: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_valresult.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_valresult.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_verifynode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_verifynode.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixresults.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixresults.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_buildresult.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_policynode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_valresult.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_verifynode.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixresults.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixresults.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_store.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_store.c
pkix_store.c: In function pkix_CertStore_Hashcode:
pkix_store.c:77:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
pkix_store.c:78:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
pkix_store.c:79:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
pkix_store.c:80:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
pkix_store.c:81:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixstore.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixstore.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_store.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixstore.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixstore.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_validate.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_validate.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_lifecycle.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_lifecycle.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_build.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_build.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixtop.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixtop.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_validate.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_lifecycle.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_build.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixtop.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixtop.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_tools.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_tools.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_error.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_error.c
pkix_error.c: In function pkix_Error_Hashcode:
pkix_error.c:328:20: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_logger.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_logger.c
pkix_logger.c: In function pkix_Logger_Hashcode:
pkix_logger.c:495:20: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_list.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_list.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_errpaths.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_errpaths.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixutil.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixutil.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_tools.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_error.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_logger.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_list.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_errpaths.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixutil.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixutil.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix'
cd pkix_pl_nss; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
cd pki; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_basicconstraints.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_basicconstraints.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_cert.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_cert.c
pkix_pl_cert.c: In function PKIX_PL_Cert_Create:
pkix_pl_cert.c:1518:22: warning: variable copyDER set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicyinfo.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_certpolicyinfo.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicymap.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_certpolicymap.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicyqualifier.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_certpolicyqualifier.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crl.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_crl.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crldp.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_crldp.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crlentry.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_crlentry.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_date.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_date.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_generalname.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_generalname.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_infoaccess.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_infoaccess.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_nameconstraints.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_nameconstraints.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocsprequest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_ocsprequest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocspresponse.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_ocspresponse.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_publickey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_publickey.c
pkix_pl_publickey.c: In function pkix_pl_PublicKey_Hashcode:
pkix_pl_publickey.c:214:21: warning: variable fullHash set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_x500name.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_x500name.c
pkix_pl_x500name.c:37:1: warning: pkix_pl_X500Name_ToString_Helper defined but not used [-Wunused-function]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocspcertid.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_ocspcertid.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixpki.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixpki.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_basicconstraints.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_cert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicyinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicymap.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicyqualifier.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crldp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crlentry.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_date.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_generalname.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_infoaccess.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_nameconstraints.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocsprequest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocspresponse.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_publickey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_x500name.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocspcertid.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixpki.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixpki.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_bigint.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_bigint.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_bytearray.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_bytearray.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_common.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_common.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_error.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_error.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_hashtable.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_hashtable.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_lifecycle.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_lifecycle.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_mem.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_mem.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_monitorlock.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_monitorlock.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_mutex.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_mutex.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_object.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_object.c
pkix_pl_object.c: In function pkix_pl_Object_Hashcode_Default:
pkix_pl_object.c:374:19: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_oid.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_oid.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_primhash.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_primhash.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_rwlock.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_rwlock.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_string.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_string.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixsystem.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixsystem.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_bigint.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_bytearray.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_common.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_error.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_hashtable.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_lifecycle.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_mem.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_monitorlock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_mutex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_object.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_oid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_primhash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_rwlock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_string.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixsystem.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixsystem.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_aiamgr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_aiamgr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_colcertstore.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_colcertstore.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_httpcertstore.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_httpcertstore.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_httpdefaultclient.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_httpdefaultclient.c
pkix_pl_httpdefaultclient.c: In function pkix_pl_HttpDefaultClient_KeepAliveSession:
pkix_pl_httpdefaultclient.c:1135:36: warning: variable client set but not used [-Wunused-but-set-variable]
pkix_pl_httpdefaultclient.c: In function pkix_pl_HttpDefaultClient_Cancel:
pkix_pl_httpdefaultclient.c:1487:36: warning: variable client set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldaptemplates.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_ldaptemplates.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapcertstore.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_ldapcertstore.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapresponse.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_ldapresponse.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldaprequest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_ldaprequest.c
pkix_pl_ldaprequest.c: In function pkix_pl_LdapRequest_Destroy:
pkix_pl_ldaprequest.c:266:30: warning: variable ldapRq set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapdefaultclient.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_ldapdefaultclient.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_nsscontext.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_nsscontext.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_pk11certstore.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_pk11certstore.c
pkix_pl_pk11certstore.c: In function NameCacheHasFetchedCrlInfo:
pkix_pl_pk11certstore.c:382:22: warning: variable cert set but not used [-Wunused-but-set-variable]
pkix_pl_pk11certstore.c: In function DownloadCrl:
pkix_pl_pk11certstore.c:782:16: warning: variable savedError set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_socket.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss pkix_pl_socket.c
pkix_pl_socket.c: In function pkix_pl_socket_timestamp:
pkix_pl_socket.c:65:9: warning: format %lld expects argument of type long long int, but argument 2 has type PRInt64 [-Wformat]
pkix_pl_socket.c: In function pkix_pl_socket_traceLine:
pkix_pl_socket.c:143:35: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
pkix_pl_socket.c: In function pkix_pl_socket_tracePartialLine:
pkix_pl_socket.c:187:43: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
pkix_pl_socket.c: In function pkix_pl_socket_tracebuff:
pkix_pl_socket.c:246:43: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixmodule.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixmodule.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_aiamgr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_colcertstore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_httpcertstore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_httpdefaultclient.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldaptemplates.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapcertstore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapresponse.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldaprequest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapdefaultclient.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_nsscontext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_pk11certstore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_socket.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixmodule.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixmodule.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix'
cd certdb; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certdb'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/alg1485.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss alg1485.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdb.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss certdb.c
certdb.c: In function cert_VerifySubjectAltName:
certdb.c:1426:18: warning: variable hnLen set but not used [-Wunused-but-set-variable]
certdb.c: In function CERT_ImportCerts:
certdb.c:2435:15: warning: variable rv set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certv3.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss certv3.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certxutl.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss certxutl.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crl.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss crl.c
crl.c: In function crl_storeCRL:
crl.c:632:15: warning: variable rv set but not used [-Wunused-but-set-variable]
crl.c: In function cert_CheckCertRevocationStatus:
crl.c:2634:25: warning: comparison between enum _SECStatus and SECCertTimeValidity [-Wenum-compare]
crl.c:2690:27: warning: unused variable rv2 [-Wunused-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/genname.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss genname.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/stanpcertdb.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss stanpcertdb.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/polcyxtn.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss polcyxtn.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secname.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss secname.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xauthkid.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss xauthkid.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xbsconst.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss xbsconst.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xconst.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss xconst.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcertdb.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcertdb.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/alg1485.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certv3.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certxutl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/genname.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/stanpcertdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/polcyxtn.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secname.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xauthkid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xbsconst.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xconst.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcertdb.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcertdb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certdb'
cd certhigh; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certhigh'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certhtml.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss certhtml.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certreq.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss certreq.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlv2.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss crlv2.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocsp.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss ocsp.c
ocsp.c: In function CERT_EncodeOCSPRequest:
ocsp.c:1437:21: warning: variable tbsRequest set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspsig.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss ocspsig.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certhigh.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss certhigh.c
certhigh.c: In function CERT_MatchNickname:
certhigh.c:28:9: warning: variable len set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfy.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss certvfy.c
certvfy.c: In function cert_VerifyCertChainOld:
certvfy.c:504:102: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c:568:103: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c:596:100: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c:624:99: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c: In function CERT_VerifyCACertForUsage:
certvfy.c:839:90: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c:864:90: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c: In function CERT_VerifyCertificate:
certvfy.c:1160:97: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c:1167:97: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c:1176:90: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c: In function CERT_VerifyCert:
certvfy.c:1298:86: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c:1302:86: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c:1308:86: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfypkix.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss certvfypkix.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfypkixprint.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss certvfypkixprint.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xcrldist.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss xcrldist.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcerthi.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcerthi.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certhtml.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certreq.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlv2.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocsp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspsig.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certhigh.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfypkix.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfypkixprint.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xcrldist.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcerthi.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certhigh'
cd pk11wrap; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pk11wrap'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dev3hack.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss dev3hack.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11akey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11akey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11auth.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11auth.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11cert.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11cert.c
pk11cert.c: In function pk11_fastCert:
pk11cert.c:231:14: warning: variable status set but not used [-Wunused-but-set-variable]
pk11cert.c: In function PK11_MakeCertFromHandle:
pk11cert.c:297:12: warning: variable swapNickname set but not used [-Wunused-but-set-variable]
pk11cert.c:296:12: warning: variable isFortezzaRootCA set but not used [-Wunused-but-set-variable]
pk11cert.c: In function PK11_TraverseCertsForNicknameInSlot:
pk11cert.c:2002:28: warning: variable pk11cb set but not used [-Wunused-but-set-variable]
pk11cert.c: In function PK11_FindCertFromDERCertItem:
pk11cert.c:2146:21: warning: unused variable td [-Wunused-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11cxt.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11cxt.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11err.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11err.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11kea.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11kea.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11list.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11list.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11load.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11load.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mech.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11mech.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11merge.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11merge.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11nobj.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11nobj.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11obj.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11obj.c
pk11obj.c: In function PK11_MatchItem:
pk11obj.c:1604:22: warning: variable parent set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pars.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11pars.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pbe.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11pbe.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pk12.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11pk12.c
pk11pk12.c: In function PK11_ImportPrivateKeyInfoAndReturnKey:
pk11pk12.c:424:17: warning: variable keyType set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pqg.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11pqg.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11sdr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11sdr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11skey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11skey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11slot.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11slot.c
pk11slot.c: In function PK11_InitToken:
pk11slot.c:1101:11: warning: variable tmp set but not used [-Wunused-but-set-variable]
pk11slot.c: In function PK11_InitSlot:
pk11slot.c:1345:11: warning: variable tmp set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11util.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11util.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpk11wrap.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpk11wrap.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dev3hack.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11akey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11auth.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11cert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11cxt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11err.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11kea.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11list.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11load.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mech.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11merge.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11nobj.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11obj.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pars.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pbe.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pk12.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pqg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11sdr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11skey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11slot.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11util.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpk11wrap.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pk11wrap'
cd cryptohi; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/cryptohi'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sechash.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sechash.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/seckey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss seckey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secsign.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss secsign.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secvfy.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss secvfy.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dsautil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss dsautil.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcryptohi.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcryptohi.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sechash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/seckey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secsign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secvfy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dsautil.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcryptohi.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcryptohi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/cryptohi'
cd nss; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/nss'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssinit.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss nssinit.c
nssinit.c: In function NSS_VersionCheck:
nssinit.c:1251:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssver.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss nssver.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilwrap.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss utilwrap.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssinit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilwrap.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss.a
grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nss.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss3.so
gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnss3.so -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nss.def -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssinit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilwrap.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certhtml.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certreq.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlv2.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocsp.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspsig.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certhigh.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfy.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfypkix.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfypkixprint.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xcrldist.o ../cryptohi/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sechash.o ../cryptohi/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/seckey.o ../cryptohi/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secsign.o ../cryptohi/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secvfy.o ../cryptohi/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dsautil.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dev3hack.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11akey.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11auth.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11cert.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11cxt.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11err.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11kea.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11list.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11load.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mech.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11merge.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11nobj.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11obj.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pars.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pbe.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pk12.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pqg.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11sdr.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11skey.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11slot.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11util.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/alg1485.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdb.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certv3.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certxutl.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crl.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/genname.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/stanpcertdb.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/polcyxtn.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secname.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xauthkid.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xbsconst.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xconst.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/asymmkey.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certificate.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cryptocontext.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symmkey.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/trustdomain.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tdcache.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdecode.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkistore.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkibase.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pki3hack.o ../dev/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devslot.o ../dev/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devtoken.o ../dev/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devutil.o ../dev/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ckhelper.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/arena.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/error.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/errorval.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hashops.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libc.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tracker.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/item.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utf8.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/list.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o ../libpkix/pkix/certsel/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_build.o ../libpkix/pkix/util/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_error.o ../libpkix/pkix/util/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_list.o ../libpkix/pkix/util/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_socket.o -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss3.so
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss3.so ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/nss'
cd ssl; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ssl'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derive.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss derive.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dtlscon.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss dtlscon.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/prelib.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss prelib.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3con.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss ssl3con.c
ssl3con.c: In function ssl3_InitPendingContextsBypass:
ssl3con.c:1414:28: warning: variable compression_method set but not used [-Wunused-but-set-variable]
ssl3con.c:1412:16: warning: variable macLength set but not used [-Wunused-but-set-variable]
ssl3con.c: In function ssl3_IllegalParameter:
ssl3con.c:2742:12: warning: variable isTLS set but not used [-Wunused-but-set-variable]
ssl3con.c: In function ssl3_HandleCertificate:
ssl3con.c:8345:12: warning: variable trusted set but not used [-Wunused-but-set-variable]
ssl3con.c: In function ssl3_RecordKeyLog:
ssl3con.c:8791:19: warning: variable sid set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3gthr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss ssl3gthr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslauth.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sslauth.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslcon.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sslcon.c
sslcon.c: In function ssl2_HandleMessage:
sslcon.c:2498:9: warning: variable rv2 set but not used [-Wunused-but-set-variable]
sslcon.c: In function NSSSSL_VersionCheck:
sslcon.c:3687:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssldef.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss ssldef.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslenum.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sslenum.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslerr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sslerr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslerrstrs.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sslerrstrs.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslinit.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sslinit.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3ext.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss ssl3ext.c
ssl3ext.c: In function ssl3_GetSessionTicketKeys:
ssl3ext.c:195:38: warning: comparison between PRStatus and enum _SECStatus [-Wenum-compare]
ssl3ext.c: In function ssl3_HandleServerNameXtn:
ssl3ext.c:390:17: warning: variable type set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslgathr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sslgathr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslmutex.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sslmutex.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslnonce.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sslnonce.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslreveal.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sslreveal.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsecur.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sslsecur.c
sslsecur.c: In function ssl_SecureRecv:
sslsecur.c:1103:22: warning: variable sec set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsnce.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sslsnce.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsock.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sslsock.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltrace.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss ssltrace.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslver.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sslver.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/authcert.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss authcert.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmpcert.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmpcert.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslinfo.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss sslinfo.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3ecc.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss ssl3ecc.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/unix_err.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss unix_err.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derive.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dtlscon.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/prelib.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3con.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3gthr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslauth.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslcon.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssldef.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslenum.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslerr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslerrstrs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslinit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3ext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslgathr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslmutex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslnonce.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslreveal.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsecur.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsnce.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltrace.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/authcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmpcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3ecc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/unix_err.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl.a
grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl3.so
gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libssl3.so -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl.def -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derive.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dtlscon.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/prelib.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3con.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3gthr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslauth.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslcon.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssldef.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslenum.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslerr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslerrstrs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslinit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3ext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslgathr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslmutex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslnonce.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslreveal.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsecur.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsnce.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltrace.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/authcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmpcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3ecc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/unix_err.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl3.so
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl3.so ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ssl'
cd pkcs12; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs12'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12local.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss p12local.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12creat.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss p12creat.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12dec.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss p12dec.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12plcy.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss p12plcy.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12tmpl.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss p12tmpl.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12e.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss p12e.c
p12e.c: In function sec_PKCS12CreateSafeBag:
p12e.c:698:12: warning: variable setName set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12d.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss p12d.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs12.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs12.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12local.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12creat.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12dec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12plcy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12tmpl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12e.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12d.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs12.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs12.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs12'
cd pkcs7; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs7'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certread.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss certread.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7common.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss p7common.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7create.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss p7create.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7decode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss p7decode.c
p7decode.c: In function sec_pkcs7_decoder_get_recipient_key:
p7decode.c:410:9: warning: unused variable bulkLength [-Wunused-variable]
p7decode.c: In function sec_pkcs7_verify_signature:
p7decode.c:1291:21: warning: variable crls set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7encode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss p7encode.c
p7encode.c: In function sec_pkcs7_encoder_start_encrypt:
p7encode.c:64:18: warning: variable wincx set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7local.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss p7local.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmime.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss secmime.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs7.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs7.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certread.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7common.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7create.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7decode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7encode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7local.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmime.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs7.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs7.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs7'
cd smime; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/smime'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsarray.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmsarray.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsasn1.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmsasn1.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsattr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmsattr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmscinfo.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmscinfo.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmscipher.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmscipher.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdecode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmsdecode.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdigdata.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmsdigdata.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdigest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmsdigest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsencdata.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmsencdata.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsencode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmsencode.c
cmsencode.c: In function nss_cms_encoder_notify:
cmsencode.c:127:18: warning: variable poolp set but not used [-Wunused-but-set-variable]
cmsencode.c: In function nss_cms_before_data:
cmsencode.c:206:18: warning: variable poolp set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsenvdata.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmsenvdata.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsmessage.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmsmessage.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmspubkey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmspubkey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsrecinfo.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmsrecinfo.c
cmsrecinfo.c: In function NSS_CMSRecipientInfo_UnwrapBulkKey:
cmsrecinfo.c:531:21: warning: variable encalg set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsreclist.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmsreclist.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmssigdata.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmssigdata.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmssiginfo.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmssiginfo.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsudf.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmsudf.c
cmsudf.c: In function nss_cmstype_hash_key:
cmsudf.c:84:11: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
cmsudf.c: In function nss_cmstype_compare_keys:
cmsudf.c:90:26: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
cmsudf.c:91:26: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmsutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimemessage.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss smimemessage.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimeutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss smimeutil.c
smimeutil.c: In function NSSSMIME_VersionCheck:
smimeutil.c:772:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimever.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss smimever.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsarray.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsasn1.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsattr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmscinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmscipher.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdecode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdigdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdigest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsencdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsencode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsenvdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsmessage.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmspubkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsrecinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsreclist.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmssigdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmssiginfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsudf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimemessage.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimeutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimever.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime.a
grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smime.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime3.so
gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libsmime3.so -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smime.def -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsarray.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsasn1.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsattr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmscinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmscipher.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdecode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdigdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdigest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsencdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsencode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsenvdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsmessage.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmspubkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsrecinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsreclist.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmssigdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmssiginfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsudf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimemessage.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimeutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimever.o ../pkcs12/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12local.o ../pkcs12/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12creat.o ../pkcs12/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12dec.o ../pkcs12/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12plcy.o ../pkcs12/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12tmpl.o ../pkcs12/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12e.o ../pkcs12/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12d.o ../pkcs7/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certread.o ../pkcs7/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7common.o ../pkcs7/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7create.o ../pkcs7/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7decode.o ../pkcs7/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7encode.o ../pkcs7/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7local.o ../pkcs7/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmime.o -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime3.so
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime3.so ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/smime'
cd crmf; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/crmf'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfenc.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss crmfenc.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmftmpl.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss crmftmpl.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfreq.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss crmfreq.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfpop.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss crmfpop.c
crmfpop.c: In function CRMF_CertReqMsgSetRAVerifiedPOP:
crmfpop.c:36:14: warning: variable dummy set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfdec.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss crmfdec.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfget.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss crmfget.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfcont.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss crmfcont.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfasn1.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmmfasn1.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfresp.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmmfresp.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfrec.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmmfrec.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfchal.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss cmmfchal.c
cmmfchal.c: In function cmmf_create_witness_and_challenge:
cmmfchal.c:33:22: warning: variable id set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/servget.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss servget.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss encutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/respcli.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss respcli.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/respcmn.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss respcmn.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/challcli.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss challcli.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/asn1cmn.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss asn1cmn.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcrmf.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcrmf.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfenc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmftmpl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfreq.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfpop.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfdec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfget.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfcont.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfasn1.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfresp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfrec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfchal.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/servget.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/respcli.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/respcmn.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/challcli.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/asn1cmn.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcrmf.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcrmf.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/crmf'
cd jar; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/jar'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarver.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss jarver.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarsign.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss jarsign.c
jarsign.c: In function jar_create_pk7:
jarsign.c:174:11: warning: variable errstring set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jar.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss jar.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jar-ds.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss jar-ds.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarfile.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss jarfile.c
jarfile.c: In function jar_listtar:
jarfile.c:824:12: warning: variable when set but not used [-Wunused-but-set-variable]
jarfile.c:823:14: warning: variable mode set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarint.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss jarint.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libjar.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libjar.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarsign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jar.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jar-ds.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarfile.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarint.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libjar.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libjar.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/jar'
cd ckfw; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crypto.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr crypto.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/find.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr find.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr hash.c
hash.c: In function nss_ckfw_identity_hash:
hash.c:55:16: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/instance.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr instance.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mutex.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr mutex.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/object.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr object.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/session.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr session.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sessobj.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr sessobj.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/slot.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr slot.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/token.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr token.c
token.c: In function nssCKFWToken_GetUTCTime:
token.c:1265:27: warning: variable z set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/wrap.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr wrap.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mechanism.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr mechanism.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckfw.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckfw.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crypto.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/find.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/instance.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mutex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/object.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/session.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sessobj.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/slot.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/token.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/wrap.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mechanism.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckfw.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckfw.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
cd builtins; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw/builtins'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/anchor.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr anchor.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/constants.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr constants.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bfind.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr bfind.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/binst.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr binst.c
binst.c: In function builtins_mdInstance_GetLibraryVersion:
binst.c:74:17: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bobject.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr bobject.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bsession.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr bsession.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bslot.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr bslot.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoken.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr btoken.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdata.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr certdata.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ckbiver.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr ckbiver.c
grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssckbi.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckbi.so
gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnssckbi.so -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssckbi.def -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckbi.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/anchor.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/constants.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bfind.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/binst.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bobject.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bsession.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bslot.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoken.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ckbiver.o ../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckfw.a ../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a -L../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckbi.so
../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckbi.so ../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw/builtins'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw'
cd sysinit; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sysinit'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsssysinit.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss nsssysinit.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsssysinit.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.a
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.so
gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnsssysinit.so -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsssysinit.o -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.so
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.so ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sysinit'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib'
cd cmd; gmake libs
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd'
cd lib; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lib'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/basicutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss basicutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss secutil.c
secutil.c: In function SECU_ChangePW2:
secutil.c:319:15: warning: variable rv set but not used [-Wunused-but-set-variable]
secutil.c: In function SECU_displayVerifyLog:
secutil.c:3167:11: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
secutil.c:3183:11: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secpwd.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss secpwd.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derprint.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss derprint.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/moreoids.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss moreoids.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pppolicy.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pppolicy.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ffs.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss ffs.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11table.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss pk11table.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsectool.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsectool.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/basicutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secpwd.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derprint.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/moreoids.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pppolicy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ffs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11table.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsectool.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsectool.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lib'
cd addbuiltin; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/addbuiltin'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/addbuiltin.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd addbuiltin.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/addbuiltin -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/addbuiltin.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/addbuiltin ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/addbuiltin'
cd atob; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/atob'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/atob.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm atob.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/atob -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/atob.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/atob ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/atob'
cd bltest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/bltest'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/blapitest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken blapitest.c
blapitest.c: In function serialize_key:
blapitest.c:319:15: warning: variable status set but not used [-Wunused-but-set-variable]
blapitest.c: In function dsaOp:
blapitest.c:2143:83: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2175:83: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2211:79: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c: In function ecdsaOp:
blapitest.c:2265:83: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2298:83: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2333:79: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c: In function cipherDoOp:
blapitest.c:2403:79: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2437:79: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2471:79: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c: In function printPR_smpString:
blapitest.c:2602:13: warning: variable prnRes set but not used [-Wunused-but-set-variable]
blapitest.c: In function main:
blapitest.c:3473:11: warning: variable infileName set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bltest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/blapitest.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bltest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/bltest'
cd btoa; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/btoa'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoa.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm btoa.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoa -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoa.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoa ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/btoa'
cd certcgi; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certcgi'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certcgi.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm certcgi.c
certcgi.c: In function MakeV1Cert:
certcgi.c:530:15: warning: variable rv set but not used [-Wunused-but-set-variable]
certcgi.c: In function string_to_binary:
certcgi.c:1420:9: warning: variable low_digit set but not used [-Wunused-but-set-variable]
certcgi.c:1419:9: warning: variable high_digit set but not used [-Wunused-but-set-variable]
certcgi.c: At top level:
certcgi.c:360:1: warning: update_data_by_name defined but not used [-Wunused-function]
certcgi.c:388:1: warning: update_data_by_index defined but not used [-Wunused-function]
certcgi.c:404:1: warning: add_field defined but not used [-Wunused-function]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certcgi -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certcgi.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certcgi ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certcgi'
cd certutil; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certutil'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certext.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd certext.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd certutil.c
certutil.c: In function CreateCert:
certutil.c:1805:13: warning: variable reqDER set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/keystuff.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd keystuff.c
keystuff.c: In function CERTUTIL_GeneratePrivateKey:
keystuff.c:496:15: warning: variable algtag set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certutil -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/keystuff.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certutil ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certutil'
cd checkcert; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/checkcert'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/checkcert.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm checkcert.c
checkcert.c: In function OurVerifyData:
checkcert.c:125:15: warning: variable sigAlgTag set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/checkcert -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/checkcert.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/checkcert ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/checkcert'
cd chktest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/chktest'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/chktest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm chktest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/chktest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/chktest.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/chktest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/chktest'
cd crlutil; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crlutil'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlgen_lex.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm crlgen_lex.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlgen.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm crlgen.c
crlgen.c: In function crlgen_RmCert:
crlgen.c:1082:18: warning: variable arena set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm crlutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlutil -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlgen_lex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlgen.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlutil.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlutil ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crlutil'
cd crmftest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crmftest'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/testcrmf.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss testcrmf.c
testcrmf.c: In function get_serial_number:
testcrmf.c:130:14: warning: variable rv set but not used [-Wunused-but-set-variable]
testcrmf.c: In function main:
testcrmf.c:1539:12: warning: variable PArg set but not used [-Wunused-but-set-variable]
testcrmf.c:1538:12: warning: variable sArg set but not used [-Wunused-but-set-variable]
testcrmf.c:1537:12: warning: variable eArg set but not used [-Wunused-but-set-variable]
testcrmf.c:1536:12: warning: variable pArg set but not used [-Wunused-but-set-variable]
testcrmf.c: At top level:
testcrmf.c:941:1: warning: mapWrapKeyType defined but not used [-Wunused-function]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmftest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/testcrmf.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcrmf.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmftest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crmftest'
cd dbtest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/dbtest'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbtest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm dbtest.c
In file included from ../modutil/modutil.h:21:0,
from dbtest.c:32:
../modutil/error.h:136:14: warning: msgStrings defined but not used [-Wunused-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbtest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbtest.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbtest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/dbtest'
cd derdump; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/derdump'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdump.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm derdump.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdump -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdump.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdump ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/derdump'
cd digest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/digest'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/digest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm digest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/digest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/digest.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/digest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/digest'
cd httpserv; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/httpserv'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/httpserv.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm httpserv.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/httpserv -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/httpserv.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/httpserv ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/httpserv'
cd fipstest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/fipstest'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss fipstest.c
fipstest.c: In function drbg:
fipstest.c:2602:12: warning: variable predictionResistance set but not used [-Wunused-but-set-variable]
fipstest.c: At top level:
fipstest.c:2540:1: warning: alloc_value defined but not used [-Wunused-function]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/fipstest'
cd lowhashtest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lowhashtest'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowhashtest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../nss/lib/freebl -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken lowhashtest.c
lowhashtest.c: In function main:
lowhashtest.c:402:17: warning: unused variable status [-Wunused-variable]
lowhashtest.c:401:17: warning: unused variable optstate [-Wunused-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowhashtest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../nss/lib/freebl -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowhashtest.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -lfreebl3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowhashtest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lowhashtest'
cd listsuites; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/listsuites'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/listsuites.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd listsuites.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/listsuites -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/listsuites.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/listsuites ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/listsuites'
cd makepqg; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/makepqg'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/makepqg.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm makepqg.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/makepqg -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/makepqg.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/makepqg ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/makepqg'
cd multinit; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/multinit'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/multinit.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss multinit.c
multinit.c:320:1: warning: appendItem defined but not used [-Wunused-function]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/multinit -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/multinit.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/multinit ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/multinit'
cd ocspclnt; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspclnt'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspclnt.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd ocspclnt.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspclnt -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspclnt.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspclnt ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspclnt'
cd ocspresp; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspresp'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspresp.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd ocspresp.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspresp -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspresp.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspresp ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspresp'
cd oidcalc; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/oidcalc'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidcalc.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm oidcalc.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidcalc -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidcalc.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidcalc ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/oidcalc'
cd p7content; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7content'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7content.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd p7content.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7content -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7content.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7content ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7content'
cd p7env; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7env'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7env.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd p7env.c
p7env.c: In function main:
p7env.c:135:11: warning: variable certName set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7env -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7env.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7env ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7env'
cd p7sign; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7sign'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7sign.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd p7sign.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7sign -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7sign.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7sign ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7sign'
cd p7verify; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7verify'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7verify.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd p7verify.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7verify -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7verify.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7verify ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7verify'
cd pk12util; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk12util'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk12util.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd pk12util.c
pk12util.c: In function p12u_InitContext:
pk12util.c:104:12: warning: variable fileExist set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk12util -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk12util.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk12util ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk12util'
cd pk11mode; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk11mode'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd pk11mode.c
pk11mode.c: In function PKM_TLSMasterKeyDerive:
pk11mode.c:4561:16: warning: variable expected_version set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mode -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mode.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mode ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk11mode'
cd pk1sign; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk1sign'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk1sign.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd pk1sign.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk1sign -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk1sign.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk1sign ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk1sign'
cd pkix-errcodes; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pkix-errcodes'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix-errcodes.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd pkix-errcodes.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix-errcodes -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix-errcodes.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix-errcodes ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pkix-errcodes'
cd pp; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pp'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pp.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm pp.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pp -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pp.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pp ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pp'
cd pwdecrypt; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pwdecrypt'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pwdecrypt.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd pwdecrypt.c
pwdecrypt.c: In function doDecrypt:
pwdecrypt.c:140:18: warning: unused variable i [-Wunused-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pwdecrypt -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pwdecrypt.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pwdecrypt ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pwdecrypt'
cd rsaperf; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/rsaperf'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsaperf.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd rsaperf.c
rsaperf.c: In function main:
rsaperf.c:433:27: warning: variable certdb set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/defkey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd defkey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsaperf -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsaperf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/defkey.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsaperf ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/rsaperf'
cd sdrtest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/sdrtest'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdrtest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd sdrtest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdrtest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdrtest.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdrtest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/sdrtest'
cd selfserv; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/selfserv'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/selfserv.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm selfserv.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/selfserv -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/selfserv.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/selfserv ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/selfserv'
cd signtool; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signtool'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signtool.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd signtool.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certgen.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd certgen.c
certgen.c: In function sign_cert:
certgen.c:423:11: warning: variable dummy set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/javascript.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd javascript.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/list.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd list.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sign.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd sign.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/util.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd util.c
util.c: In function XP_GetString:
util.c:21:5: warning: return discards const qualifier from pointer target type [enabled by default]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/verify.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd verify.c
verify.c: In function VerifyJar:
verify.c:55:11: warning: assignment discards const qualifier from pointer target type [enabled by default]
verify.c: In function JarWho:
verify.c:286:11: warning: assignment discards const qualifier from pointer target type [enabled by default]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/zip.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd zip.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signtool -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signtool.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certgen.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/javascript.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/list.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/util.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/verify.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/zip.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libjar.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signtool ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signtool'
cd signver; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signver'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signver.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd signver.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk7print.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd pk7print.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signver -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk7print.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signver ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signver'
cd shlibsign; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss shlibsign.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign.o -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
cd mangle; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/mangle'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mangle.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss mangle.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mangle -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mangle.o -L../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mangle ../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/mangle'
cd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ ; sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ" \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ" Linux \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib" "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.so"
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign -v -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.so
Library File: ../../../security/nss/lib/softoken/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn3.so 731308 bytes
Check File: ../../../security/nss/lib/softoken/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn3.chk
Link: libsoftokn3.chk
hash: 32 bytes
f1 63 c8 c3 36 ce bd 38 c5 c6
77 76 83 ca b2 7c e4 dd 60 e8
df 81 7e b8 37 9c d6 c5 e8 cd
bb f8
signature: 64 bytes
17 c1 b8 6b 3a a3 23 07 b1 ee
e0 88 56 bc 05 34 ba e9 fd 77
d0 2d 60 70 d5 54 33 e1 7e 45
41 94 62 36 f6 84 1f 03 fa c0
23 ef ca dc b0 20 10 47 6e 1b
db 18 45 0c cf d7 11 a0 a7 9c
42 8d 07 ef
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ...
cd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ ; sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ" \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ" Linux \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib" "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl3.so"
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign -v -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl3.so
Library File: ../../../security/nss/lib/freebl/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so 1108591 bytes
Check File: ../../../security/nss/lib/freebl/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/libfreebl3.chk
Link: libfreebl3.chk
hash: 32 bytes
9a 72 69 c9 80 62 e8 89 8e 70
75 cc 38 03 09 86 fc 9c 28 d9
51 53 27 e5 69 9d 1f 73 47 b0
bd 14
signature: 64 bytes
53 ea 05 2b 9d b5 ad 69 37 bc
b8 bc 0b 23 45 9c d7 ec 69 57
8a 51 30 a8 a0 60 b6 40 33 9a
65 6c 43 7d 23 14 ac 10 31 86
d9 1b 01 60 fb e6 57 bf 04 2a
4d 35 06 1b 0b 82 25 b3 ff 6c
05 01 50 62
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ...
cd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ ; sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ" \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ" Linux \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib" "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.so"
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign -v -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.so
Library File: ../../../security/nss/lib/softoken/legacydb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm3.so 482493 bytes
Check File: ../../../security/nss/lib/softoken/legacydb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm3.chk
Link: libnssdbm3.chk
hash: 32 bytes
f9 91 54 a6 44 d1 ad de cd 11
ce a1 ca b4 ba b8 45 8b 52 22
47 fd 1f 40 b4 ca 4f 29 5d 01
98 fd
signature: 64 bytes
56 00 68 91 d6 c3 9f d4 a2 b2
4f 53 98 0f ab a3 01 3d af f8
c8 ad f4 29 e8 21 e6 27 01 de
17 1b 45 a1 19 c5 5d 54 9d ab
bd 4e 95 b5 f9 27 20 16 4a 8c
d8 83 0c 66 e7 b1 79 84 fb c9
b5 a9 e4 f2
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ...
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign'
cd smimetools; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/smimetools'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm cmsutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/smimetools'
cd ssltap; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ssltap'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltap.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm ssltap.c
ssltap.c: In function print_ssl:
ssltap.c:1137:9: warning: variable l set but not used [-Wunused-but-set-variable]
ssltap.c:1137:7: warning: variable i set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltap -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltap.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltap ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ssltap'
cd strsclnt; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/strsclnt'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/strsclnt.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm strsclnt.c
strsclnt.c: In function myHandshakeCallback:
strsclnt.c:706:56: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
strsclnt.c: In function do_connects:
strsclnt.c:831:62: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
strsclnt.c:726:15: warning: variable result set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/strsclnt -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/strsclnt.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/strsclnt ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/strsclnt'
cd symkeyutil; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/symkeyutil'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symkeyutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd symkeyutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symkeyutil -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symkeyutil.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symkeyutil ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/symkeyutil'
cd tests; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tests'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/baddbdir.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm baddbdir.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/baddbdir -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/baddbdir.o \
../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/conflict.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm conflict.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/conflict -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/conflict.o \
../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertimetest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm dertimetest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertimetest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertimetest.o \
../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encodeinttest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm encodeinttest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encodeinttest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encodeinttest.o \
../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nonspr10.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm nonspr10.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nonspr10 -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nonspr10.o \
../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/remtest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm remtest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/remtest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/remtest.o \
../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmodtest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm secmodtest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmodtest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmodtest.o \
../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/baddbdir Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/conflict Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertimetest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encodeinttest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nonspr10 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/remtest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmodtest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tests'
cd tstclnt; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tstclnt'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tstclnt.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm tstclnt.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tstclnt -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tstclnt.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tstclnt ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tstclnt'
cd vfychain; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfychain'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfychain.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd vfychain.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfychain -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfychain.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfychain ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfychain'
cd vfyserv; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfyserv'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyserv.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm vfyserv.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm vfyutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyserv -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyserv.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyutil.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyserv ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfyserv'
cd modutil; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/modutil'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/modutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm modutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm pk11.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/instsec.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm instsec.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/install.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm install.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/installparse.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm installparse.c
ytab.c: In function Pk11Install_yyparse:
ytab.c:219:5: warning: suggest parentheses around assignment used as truth value [-Wparentheses]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/install-ds.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm install-ds.c
install-ds.c: In function Pk11Install_File_Generate:
install-ds.c:223:40: warning: comparison with string literal results in unspecified behavior [-Waddress]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lex.Pk11Install_yy.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm lex.Pk11Install_yy.c
lex.Pk11Install_yy.cpp:1060:13: warning: Pkcs11Install_yyunput defined but not used [-Wunused-function]
lex.Pk11Install_yy.cpp:1106:12: warning: input defined but not used [-Wunused-function]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/modutil -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/modutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/instsec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/install.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/installparse.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/install-ds.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lex.Pk11Install_yy.o ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libjar.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/modutil ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/modutil'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd'
TB [2012-11-27 18:54:32] NSS - build - 64 bits - DBG PASSED
TB [2012-11-27 18:54:32] ######## NSS - tests - 64 bits - DBG ########
TinderboxPrint:
TB [2012-11-27 18:54:32] $ cd /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests
TB [2012-11-27 18:54:32] $ ./all.sh
testdir is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security
init.sh init: Creating /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security
********************************************
Platform: Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ
Results: buildnss02.1
********************************************
init.sh init: Testing PATH .:/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin:/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib:/bin:/usr/bin:/usr/lib64/ccache:/usr/local/bin:/usr/local/sbin:/usr/sbin:/home/tinderbox/.local/bin:/home/tinderbox/bin against LIB /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib:
Running tests for cipher
TIMESTAMP cipher BEGIN: Tue Nov 27 18:54:32 EST 2012
cipher.sh: Cipher Tests ===============================
cipher.sh: DES ECB Encrypt --------------------------------
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des_ecb passed.
cipher.sh: #1: DES ECB Encrypt - PASSED
cipher.sh: DES ECB Decrypt --------------------------------
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des_ecb passed.
cipher.sh: #2: DES ECB Decrypt - PASSED
cipher.sh: DES CBC Encrypt --------------------------------
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des_cbc passed.
cipher.sh: #3: DES CBC Encrypt - PASSED
cipher.sh: DES CBC Decrypt --------------------------------
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des_cbc passed.
cipher.sh: #4: DES CBC Decrypt - PASSED
cipher.sh: DES3 ECB Encrypt --------------------------------
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des3_ecb passed.
cipher.sh: #5: DES3 ECB Encrypt - PASSED
cipher.sh: DES3 ECB Decrypt --------------------------------
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des3_ecb passed.
cipher.sh: #6: DES3 ECB Decrypt - PASSED
cipher.sh: DES3 CBC Encrypt --------------------------------
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des3_cbc passed.
cipher.sh: #7: DES3 CBC Encrypt - PASSED
cipher.sh: DES3 CBC Decrypt --------------------------------
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des3_cbc passed.
cipher.sh: #8: DES3 CBC Decrypt - PASSED
cipher.sh: AES ECB Encrypt --------------------------------
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_ecb passed.
cipher.sh: #9: AES ECB Encrypt - PASSED
cipher.sh: AES ECB Decrypt --------------------------------
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for aes_ecb passed.
cipher.sh: #10: AES ECB Decrypt - PASSED
cipher.sh: AES CBC Encrypt --------------------------------
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_cbc passed.
cipher.sh: #11: AES CBC Encrypt - PASSED
cipher.sh: AES CBC Decrypt --------------------------------
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for aes_cbc passed.
cipher.sh: #12: AES CBC Decrypt - PASSED
cipher.sh: Camellia ECB Encrypt --------------------------------
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
cipher.sh: #13: Camellia ECB Encrypt - PASSED
cipher.sh: Camellia ECB Decrypt --------------------------------
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
cipher.sh: #14: Camellia ECB Decrypt - PASSED
cipher.sh: Camellia CBC Encrypt --------------------------------
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
cipher.sh: #15: Camellia CBC Encrypt - PASSED
cipher.sh: Camellia CBC Decrypt --------------------------------
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
cipher.sh: #16: Camellia CBC Decrypt - PASSED
cipher.sh: SEED ECB Encrypt --------------------------------
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for seed_ecb passed.
cipher.sh: #17: SEED ECB Encrypt - PASSED
cipher.sh: SEED ECB Decrypt --------------------------------
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for seed_ecb passed.
cipher.sh: #18: SEED ECB Decrypt - PASSED
cipher.sh: SEED CBC Encrypt --------------------------------
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for seed_cbc passed.
cipher.sh: #19: SEED CBC Encrypt - PASSED
cipher.sh: SEED CBC Decrypt --------------------------------
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for seed_cbc passed.
cipher.sh: #20: SEED CBC Decrypt - PASSED
cipher.sh: RC2 ECB Encrypt --------------------------------
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc2_ecb passed.
cipher.sh: #21: RC2 ECB Encrypt - PASSED
cipher.sh: RC2 ECB Decrypt --------------------------------
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc2_ecb passed.
cipher.sh: #22: RC2 ECB Decrypt - PASSED
cipher.sh: RC2 CBC Encrypt --------------------------------
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc2_cbc passed.
cipher.sh: #23: RC2 CBC Encrypt - PASSED
cipher.sh: RC2 CBC Decrypt --------------------------------
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc2_cbc passed.
cipher.sh: #24: RC2 CBC Decrypt - PASSED
cipher.sh: RC4 Encrypt --------------------------------
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
cipher.sh: #25: RC4 Encrypt - PASSED
cipher.sh: RC4 Decrypt --------------------------------
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
cipher.sh: #26: RC4 Decrypt - PASSED
cipher.sh: RSA Encrypt --------------------------------
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rsa passed.
cipher.sh: #27: RSA Encrypt - PASSED
cipher.sh: RSA Decrypt --------------------------------
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rsa passed.
cipher.sh: #28: RSA Decrypt - PASSED
cipher.sh: DSA Sign --------------------------------
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
cipher.sh: #29: DSA Sign - PASSED
cipher.sh: DSA Verify --------------------------------
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
cipher.sh: #30: DSA Verify - PASSED
cipher.sh: MD2 Hash --------------------------------
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for md2 passed.
cipher.sh: #31: MD2 Hash - PASSED
cipher.sh: MD5 Hash --------------------------------
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for md5 passed.
cipher.sh: #32: MD5 Hash - PASSED
cipher.sh: SHA1 Hash --------------------------------
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha1 passed.
cipher.sh: #33: SHA1 Hash - PASSED
cipher.sh: SHA224 Hash --------------------------------
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
cipher.sh: #34: SHA224 Hash - PASSED
cipher.sh: SHA256 Hash --------------------------------
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
cipher.sh: #35: SHA256 Hash - PASSED
cipher.sh: SHA384 Hash --------------------------------
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
cipher.sh: #36: SHA384 Hash - PASSED
cipher.sh: SHA512 Hash --------------------------------
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
cipher.sh: #37: SHA512 Hash - PASSED
TIMESTAMP cipher END: Tue Nov 27 18:55:13 EST 2012
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Tue Nov 27 18:55:13 EST 2012
lowhash.sh: Lowhash Tests ===============================
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #38: lowhashtest with fips mode= for MD5 - PASSED
lowhashtest SHA1
lowhash.sh: #39: lowhashtest with fips mode= for SHA1 - PASSED
lowhashtest SHA224
lowhash.sh: #40: lowhashtest with fips mode= for SHA224 - PASSED
lowhashtest SHA256
lowhash.sh: #41: lowhashtest with fips mode= for SHA256 - PASSED
lowhashtest SHA384
lowhash.sh: #42: lowhashtest with fips mode= for SHA384 - PASSED
lowhashtest SHA512
lowhash.sh: #43: lowhashtest with fips mode= for SHA512 - PASSED
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #44: lowhashtest with fips mode= for MD5 - PASSED
lowhashtest SHA1
lowhash.sh: #45: lowhashtest with fips mode= for SHA1 - PASSED
lowhashtest SHA224
lowhash.sh: #46: lowhashtest with fips mode= for SHA224 - PASSED
lowhashtest SHA256
lowhash.sh: #47: lowhashtest with fips mode= for SHA256 - PASSED
lowhashtest SHA384
lowhash.sh: #48: lowhashtest with fips mode= for SHA384 - PASSED
lowhashtest SHA512
lowhash.sh: #49: lowhashtest with fips mode= for SHA512 - PASSED
lowhash.sh done
TIMESTAMP lowhash END: Tue Nov 27 18:55:14 EST 2012
Running tests for libpkix
TIMESTAMP libpkix BEGIN: Tue Nov 27 18:55:14 EST 2012
TIMESTAMP libpkix END: Tue Nov 27 18:55:14 EST 2012
Running tests for cert
TIMESTAMP cert BEGIN: Tue Nov 27 18:55:14 EST 2012
cert.sh: Certutil and Crlutil Tests with ECC ===============================
cert.sh: #50: Looking for root certs module. - PASSED
cert.sh: Creating a CA Certificate TestCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -f ../tests.pw
cert.sh: #51: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #52: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert TestCA --------------------------
certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #53: Creating CA Cert TestCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n TestCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -o root.cert
cert.sh: #54: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -f ../tests.pw
cert.sh: #55: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #56: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert serverCA --------------------------
certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #57: Creating CA Cert serverCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -o root.cert
cert.sh: #58: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating CA Cert chain-1-serverCA --------------------------
certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #59: Creating CA Cert chain-1-serverCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -o root.cert
cert.sh: #60: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating CA Cert chain-2-serverCA --------------------------
certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #61: Creating CA Cert chain-2-serverCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -o root.cert
cert.sh: #62: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -f ../tests.pw
cert.sh: #63: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #64: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert clientCA --------------------------
certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #65: Creating CA Cert clientCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -o root.cert
cert.sh: #66: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating CA Cert chain-1-clientCA --------------------------
certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #67: Creating CA Cert chain-1-clientCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -o root.cert
cert.sh: #68: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating CA Cert chain-2-clientCA --------------------------
certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #69: Creating CA Cert chain-2-clientCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -o root.cert
cert.sh: #70: Exporting Root Cert - PASSED
cert.sh: Creating an EC CA Certificate TestCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA
cert.sh: Creating EC CA Cert TestCA-ec --------------------------
certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #71: Creating EC CA Cert TestCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n TestCA-ec -r -d . -o ecroot.cert
cert.sh: #72: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating EC CA Cert serverCA-ec --------------------------
certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #73: Creating EC CA Cert serverCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n serverCA-ec -r -d . -o ecroot.cert
cert.sh: #74: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating EC CA Cert chain-1-serverCA-ec --------------------------
certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #75: Creating EC CA Cert chain-1-serverCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #76: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating EC CA Cert chain-2-serverCA-ec --------------------------
certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #77: Creating EC CA Cert chain-2-serverCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #78: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating EC CA Cert clientCA-ec --------------------------
certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #79: Creating EC CA Cert clientCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n clientCA-ec -r -d . -o ecroot.cert
cert.sh: #80: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating EC CA Cert chain-1-clientCA-ec --------------------------
certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #81: Creating EC CA Cert chain-1-clientCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #82: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating EC CA Cert chain-2-clientCA-ec --------------------------
certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #83: Creating EC CA Cert chain-2-clientCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #84: Exporting EC Root Cert - PASSED
cert.sh: Creating Certificates, issued by the last ===============
of a chain of CA's which are not in the same database============
Server Cert
cert.sh: Initializing buildnss02.usersys.redhat.com's Cert DB (ext.) --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -f ../tests.pw
cert.sh: #85: Initializing buildnss02.usersys.redhat.com's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #86: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #87: Generate Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 200 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -i req -o buildnss02.usersys.redhat.com.cert -f ../tests.pw
cert.sh: #88: Sign buildnss02.usersys.redhat.com's Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's Cert -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com.cert
cert.sh: #89: Import buildnss02.usersys.redhat.com's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Client Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n clientCA -t T,, -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA/clientCA.ca.cert
cert.sh: #90: Import Client Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Generate EC Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #91: Generate EC Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -i req -o buildnss02.usersys.redhat.com-ec.cert -f ../tests.pw
cert.sh: #92: Sign buildnss02.usersys.redhat.com's EC Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's EC Cert -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com-ec.cert
cert.sh: #93: Import buildnss02.usersys.redhat.com's EC Cert -t u,u,u (ext) - PASSED
cert.sh: Import Client EC Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA/clientCA-ec.ca.cert
cert.sh: #94: Import Client EC Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #95: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 201 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -i req -o buildnss02.usersys.redhat.com-ecmixed.cert -f ../tests.pw
cert.sh: #96: Sign buildnss02.usersys.redhat.com's mixed EC Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's mixed EC Cert -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com-ecmixed.cert
cert.sh: #97: Import buildnss02.usersys.redhat.com's mixed EC Cert -t u,u,u (ext) - PASSED
Importing all the server's own CA chain into the servers DB
cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA/chain-2-serverCA-ec.ca.cert
cert.sh: #98: Import chain-2-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Import chain-1-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA/chain-1-serverCA.ca.cert
cert.sh: #99: Import chain-1-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Import serverCA CA -t C,C,C for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA/serverCA.ca.cert
cert.sh: #100: Import serverCA CA -t C,C,C for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Import chain-2-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA/chain-2-serverCA.ca.cert
cert.sh: #101: Import chain-2-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Import serverCA-ec CA -t C,C,C for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA/serverCA-ec.ca.cert
cert.sh: #102: Import serverCA-ec CA -t C,C,C for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA/chain-1-serverCA-ec.ca.cert
cert.sh: #103: Import chain-1-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.) - PASSED
Client Cert
cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -f ../tests.pw
cert.sh: #104: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #105: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #106: Generate Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 300 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw
cert.sh: #107: Sign ExtendedSSLUser's Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert
cert.sh: #108: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA/serverCA.ca.cert
cert.sh: #109: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #110: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw
cert.sh: #111: Sign ExtendedSSLUser's EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert
cert.sh: #112: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA/serverCA-ec.ca.cert
cert.sh: #113: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #114: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 301 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw
cert.sh: #115: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert
cert.sh: #116: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED
Importing all the client's own CA chain into the servers DB
cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA/chain-2-clientCA-ec.ca.cert
cert.sh: #117: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA/clientCA.ca.cert
cert.sh: #118: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA/chain-2-clientCA.ca.cert
cert.sh: #119: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA/clientCA-ec.ca.cert
cert.sh: #120: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA/chain-1-clientCA-ec.ca.cert
cert.sh: #121: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA/chain-1-clientCA.ca.cert
cert.sh: #122: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh SUCCESS: EXT passed
cert.sh: Creating Client CA Issued Certificates ===============
cert.sh: Initializing TestUser's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw
cert.sh: #123: Initializing TestUser's Cert DB - PASSED
cert.sh: Loading root cert module to TestUser's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #124: Loading root cert module to TestUser's Cert DB - PASSED
cert.sh: Import Root CA for TestUser --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -i ../CA/TestCA.ca.cert
cert.sh: #125: Import Root CA for TestUser - PASSED
cert.sh: Import EC Root CA for TestUser --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -i ../CA/TestCA-ec.ca.cert
cert.sh: #126: Import EC Root CA for TestUser - PASSED
cert.sh: Generate Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #127: Generate Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's Request --------------------------
certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw
cert.sh: #128: Sign TestUser's Request - PASSED
cert.sh: Import TestUser's Cert --------------------------
certutil -A -n TestUser -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser.cert
cert.sh: #129: Import TestUser's Cert - PASSED
cert.sh SUCCESS: TestUser's Cert Created
cert.sh: Generate EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #130: Generate EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request --------------------------
certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw
cert.sh: #131: Sign TestUser's EC Request - PASSED
cert.sh: Import TestUser's EC Cert --------------------------
certutil -A -n TestUser-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser-ec.cert
cert.sh: #132: Import TestUser's EC Cert - PASSED
cert.sh SUCCESS: TestUser's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #133: Generate mixed EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw
cert.sh: #134: Sign TestUser's EC Request with RSA - PASSED
cert.sh: Import TestUser's mixed EC Cert --------------------------
certutil -A -n TestUser-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser-ecmixed.cert
cert.sh: #135: Import TestUser's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
buildnss02.usersys.redhat.com ------------------------------------
cert.sh: Initializing buildnss02.usersys.redhat.com's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw
cert.sh: #136: Initializing buildnss02.usersys.redhat.com's Cert DB - PASSED
cert.sh: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #137: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB - PASSED
cert.sh: Import Root CA for buildnss02.usersys.redhat.com --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -i ../CA/TestCA.ca.cert
cert.sh: #138: Import Root CA for buildnss02.usersys.redhat.com - PASSED
cert.sh: Import EC Root CA for buildnss02.usersys.redhat.com --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -i ../CA/TestCA-ec.ca.cert
cert.sh: #139: Import EC Root CA for buildnss02.usersys.redhat.com - PASSED
cert.sh: Generate Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #140: Generate Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's Request --------------------------
certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com.cert -f ../tests.pw
cert.sh: #141: Sign buildnss02.usersys.redhat.com's Request - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02.usersys.redhat.com.cert
cert.sh: #142: Import buildnss02.usersys.redhat.com's Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's Cert Created
cert.sh: Generate EC Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #143: Generate EC Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com-ec.cert -f ../tests.pw
cert.sh: #144: Sign buildnss02.usersys.redhat.com's EC Request - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's EC Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02.usersys.redhat.com-ec.cert
cert.sh: #145: Import buildnss02.usersys.redhat.com's EC Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #146: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com-ecmixed.cert -f ../tests.pw
cert.sh: #147: Sign buildnss02.usersys.redhat.com's EC Request with RSA - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's mixed EC Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02.usersys.redhat.com-ecmixed.cert
cert.sh: #148: Import buildnss02.usersys.redhat.com's mixed EC Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
buildnss02.usersys.redhat.com-sni --------------------------------
cert.sh: Generate Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #149: Generate Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's Request --------------------------
certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com.cert -f ../tests.pw
cert.sh: #150: Sign buildnss02-sni.usersys.redhat.com's Request - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com.cert
cert.sh: #151: Import buildnss02-sni.usersys.redhat.com's Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's Cert Created
cert.sh: Generate EC Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #152: Generate EC Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com-ec.cert -f ../tests.pw
cert.sh: #153: Sign buildnss02-sni.usersys.redhat.com's EC Request - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's EC Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com-ec.cert
cert.sh: #154: Import buildnss02-sni.usersys.redhat.com's EC Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #155: Generate mixed EC Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com-ecmixed.cert -f ../tests.pw
cert.sh: #156: Sign buildnss02-sni.usersys.redhat.com's EC Request with RSA - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's mixed EC Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com-ecmixed.cert
cert.sh: #157: Import buildnss02-sni.usersys.redhat.com's mixed EC Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's mixed EC Cert Created
cert.sh: Modify trust attributes of Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA -t TC,TC,TC -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw
cert.sh: #158: Modify trust attributes of Root CA -t TC,TC,TC - PASSED
cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA-ec -t TC,TC,TC -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw
cert.sh: #159: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED
cert.sh SUCCESS: SSL passed
cert.sh: Creating Client CA Issued Certificates ==============
cert.sh: Initializing Alice's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw
cert.sh: #160: Initializing Alice's Cert DB - PASSED
cert.sh: Loading root cert module to Alice's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #161: Loading root cert module to Alice's Cert DB - PASSED
cert.sh: Import Root CA for Alice --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -i ../CA/TestCA.ca.cert
cert.sh: #162: Import Root CA for Alice - PASSED
cert.sh: Import EC Root CA for Alice --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -i ../CA/TestCA-ec.ca.cert
cert.sh: #163: Import EC Root CA for Alice - PASSED
cert.sh: Generate Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #164: Generate Cert Request for Alice - PASSED
cert.sh: Sign Alice's Request --------------------------
certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw
cert.sh: #165: Sign Alice's Request - PASSED
cert.sh: Import Alice's Cert --------------------------
certutil -A -n Alice -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -i Alice.cert
cert.sh: #166: Import Alice's Cert - PASSED
cert.sh SUCCESS: Alice's Cert Created
cert.sh: Generate EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #167: Generate EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request --------------------------
certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw
cert.sh: #168: Sign Alice's EC Request - PASSED
cert.sh: Import Alice's EC Cert --------------------------
certutil -A -n Alice-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -i Alice-ec.cert
cert.sh: #169: Import Alice's EC Cert - PASSED
cert.sh SUCCESS: Alice's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #170: Generate mixed EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw
cert.sh: #171: Sign Alice's EC Request with RSA - PASSED
cert.sh: Import Alice's mixed EC Cert --------------------------
certutil -A -n Alice-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert
cert.sh: #172: Import Alice's mixed EC Cert - PASSED
cert.sh SUCCESS: Alice's mixed EC Cert Created
cert.sh: Initializing Bob's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw
cert.sh: #173: Initializing Bob's Cert DB - PASSED
cert.sh: Loading root cert module to Bob's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #174: Loading root cert module to Bob's Cert DB - PASSED
cert.sh: Import Root CA for Bob --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -i ../CA/TestCA.ca.cert
cert.sh: #175: Import Root CA for Bob - PASSED
cert.sh: Import EC Root CA for Bob --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -i ../CA/TestCA-ec.ca.cert
cert.sh: #176: Import EC Root CA for Bob - PASSED
cert.sh: Generate Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #177: Generate Cert Request for Bob - PASSED
cert.sh: Sign Bob's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw
cert.sh: #178: Sign Bob's Request - PASSED
cert.sh: Import Bob's Cert --------------------------
certutil -A -n Bob -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -i Bob.cert
cert.sh: #179: Import Bob's Cert - PASSED
cert.sh SUCCESS: Bob's Cert Created
cert.sh: Generate EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #180: Generate EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw
cert.sh: #181: Sign Bob's EC Request - PASSED
cert.sh: Import Bob's EC Cert --------------------------
certutil -A -n Bob-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -i Bob-ec.cert
cert.sh: #182: Import Bob's EC Cert - PASSED
cert.sh SUCCESS: Bob's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #183: Generate mixed EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw
cert.sh: #184: Sign Bob's EC Request with RSA - PASSED
cert.sh: Import Bob's mixed EC Cert --------------------------
certutil -A -n Bob-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert
cert.sh: #185: Import Bob's mixed EC Cert - PASSED
cert.sh SUCCESS: Bob's mixed EC Cert Created
cert.sh: Creating Dave's Certificate -------------------------
cert.sh: Initializing Dave's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw
cert.sh: #186: Initializing Dave's Cert DB - PASSED
cert.sh: Loading root cert module to Dave's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #187: Loading root cert module to Dave's Cert DB - PASSED
cert.sh: Import Root CA for Dave --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -i ../CA/TestCA.ca.cert
cert.sh: #188: Import Root CA for Dave - PASSED
cert.sh: Import EC Root CA for Dave --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -i ../CA/TestCA-ec.ca.cert
cert.sh: #189: Import EC Root CA for Dave - PASSED
cert.sh: Generate Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #190: Generate Cert Request for Dave - PASSED
cert.sh: Sign Dave's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw
cert.sh: #191: Sign Dave's Request - PASSED
cert.sh: Import Dave's Cert --------------------------
certutil -A -n Dave -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -i Dave.cert
cert.sh: #192: Import Dave's Cert - PASSED
cert.sh SUCCESS: Dave's Cert Created
cert.sh: Generate EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #193: Generate EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw
cert.sh: #194: Sign Dave's EC Request - PASSED
cert.sh: Import Dave's EC Cert --------------------------
certutil -A -n Dave-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -i Dave-ec.cert
cert.sh: #195: Import Dave's EC Cert - PASSED
cert.sh SUCCESS: Dave's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #196: Generate mixed EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw
cert.sh: #197: Sign Dave's EC Request with RSA - PASSED
cert.sh: Import Dave's mixed EC Cert --------------------------
certutil -A -n Dave-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -i Dave-ecmixed.cert
cert.sh: #198: Import Dave's mixed EC Cert - PASSED
cert.sh SUCCESS: Dave's mixed EC Cert Created
cert.sh: Creating multiEmail's Certificate --------------------
cert.sh: Initializing Eve's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw
cert.sh: #199: Initializing Eve's Cert DB - PASSED
cert.sh: Loading root cert module to Eve's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #200: Loading root cert module to Eve's Cert DB - PASSED
cert.sh: Import Root CA for Eve --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -i ../CA/TestCA.ca.cert
cert.sh: #201: Import Root CA for Eve - PASSED
cert.sh: Import EC Root CA for Eve --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -i ../CA/TestCA-ec.ca.cert
cert.sh: #202: Import EC Root CA for Eve - PASSED
cert.sh: Generate Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #203: Generate Cert Request for Eve - PASSED
cert.sh: Sign Eve's Request --------------------------
certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #204: Sign Eve's Request - PASSED
cert.sh: Import Eve's Cert --------------------------
certutil -A -n Eve -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -i Eve.cert
cert.sh: #205: Import Eve's Cert - PASSED
cert.sh SUCCESS: Eve's Cert Created
cert.sh: Generate EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #206: Generate EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request --------------------------
certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #207: Sign Eve's EC Request - PASSED
cert.sh: Import Eve's EC Cert --------------------------
certutil -A -n Eve-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -i Eve-ec.cert
cert.sh: #208: Import Eve's EC Cert - PASSED
cert.sh SUCCESS: Eve's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #209: Generate mixed EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #210: Sign Eve's EC Request with RSA - PASSED
cert.sh: Import Eve's mixed EC Cert --------------------------
certutil -A -n Eve-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -i Eve-ecmixed.cert
cert.sh: #211: Import Eve's mixed EC Cert - PASSED
cert.sh SUCCESS: Eve's mixed EC Cert Created
cert.sh: Importing Certificates ==============================
cert.sh: Import Bob's cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert
cert.sh: #212: Import Bob's cert into Alice's db - PASSED
cert.sh: Import Dave's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #213: Import Dave's cert into Alice's DB - PASSED
cert.sh: Import Dave's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #214: Import Dave's cert into Bob's DB - PASSED
cert.sh: Import Eve's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #215: Import Eve's cert into Alice's DB - PASSED
cert.sh: Import Eve's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #216: Import Eve's cert into Bob's DB - PASSED
cert.sh: Importing EC Certificates ==============================
cert.sh: Import Bob's EC cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert
cert.sh: #217: Import Bob's EC cert into Alice's db - PASSED
cert.sh: Import Dave's EC cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #218: Import Dave's EC cert into Alice's DB - PASSED
cert.sh: Import Dave's EC cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #219: Import Dave's EC cert into Bob's DB - PASSED
cert.sh SUCCESS: SMIME passed
cert.sh: Creating FIPS 140 DSA Certificates ==============
cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips -f ../tests.fipspw
cert.sh: #220: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED
cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #221: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED
cert.sh: Enable FIPS mode on database -----------------------
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips -fips true
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
FIPS mode enabled.
cert.sh: #222: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED
cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate --------------------------
certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise
Generating key. This may take a few moments...
cert.sh: #223: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED
cert.sh SUCCESS: FIPS passed
cert.sh: Creating Server CA Issued Certificate for
EC Curves Test Certificates ------------------------------------
cert.sh: Initializing EC Curve's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw
cert.sh: #224: Initializing EC Curve's Cert DB - PASSED
cert.sh: Loading root cert module to EC Curve's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #225: Loading root cert module to EC Curve's Cert DB - PASSED
cert.sh: Import EC Root CA for EC Curves Test Certificates --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -i ../CA/TestCA-ec.ca.cert
cert.sh: #226: Import EC Root CA for EC Curves Test Certificates - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v1 --------------------------
certutil -s "CN=Curve-c2pnb163v1, E=Curve-c2pnb163v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #227: Generate EC Cert Request for Curve-c2pnb163v1 - PASSED
cert.sh: Sign Curve-c2pnb163v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-c2pnb163v1-ec.cert -f ../tests.pw
cert.sh: #228: Sign Curve-c2pnb163v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb163v1-ec.cert
cert.sh: #229: Import Curve-c2pnb163v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v2 --------------------------
certutil -s "CN=Curve-c2pnb163v2, E=Curve-c2pnb163v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #230: Generate EC Cert Request for Curve-c2pnb163v2 - PASSED
cert.sh: Sign Curve-c2pnb163v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-c2pnb163v2-ec.cert -f ../tests.pw
cert.sh: #231: Sign Curve-c2pnb163v2's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v2's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb163v2-ec.cert
cert.sh: #232: Import Curve-c2pnb163v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v3 --------------------------
certutil -s "CN=Curve-c2pnb163v3, E=Curve-c2pnb163v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #233: Generate EC Cert Request for Curve-c2pnb163v3 - PASSED
cert.sh: Sign Curve-c2pnb163v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-c2pnb163v3-ec.cert -f ../tests.pw
cert.sh: #234: Sign Curve-c2pnb163v3's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v3's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb163v3-ec.cert
cert.sh: #235: Import Curve-c2pnb163v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb176v1 --------------------------
certutil -s "CN=Curve-c2pnb176v1, E=Curve-c2pnb176v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb176v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #236: Generate EC Cert Request for Curve-c2pnb176v1 - PASSED
cert.sh: Sign Curve-c2pnb176v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2004 -v 60 -d ../CA -i req -o Curve-c2pnb176v1-ec.cert -f ../tests.pw
cert.sh: #237: Sign Curve-c2pnb176v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb176v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb176v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb176v1-ec.cert
cert.sh: #238: Import Curve-c2pnb176v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb208w1 --------------------------
certutil -s "CN=Curve-c2pnb208w1, E=Curve-c2pnb208w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb208w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #239: Generate EC Cert Request for Curve-c2pnb208w1 - PASSED
cert.sh: Sign Curve-c2pnb208w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2005 -v 60 -d ../CA -i req -o Curve-c2pnb208w1-ec.cert -f ../tests.pw
cert.sh: #240: Sign Curve-c2pnb208w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb208w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb208w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb208w1-ec.cert
cert.sh: #241: Import Curve-c2pnb208w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb272w1 --------------------------
certutil -s "CN=Curve-c2pnb272w1, E=Curve-c2pnb272w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb272w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #242: Generate EC Cert Request for Curve-c2pnb272w1 - PASSED
cert.sh: Sign Curve-c2pnb272w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2006 -v 60 -d ../CA -i req -o Curve-c2pnb272w1-ec.cert -f ../tests.pw
cert.sh: #243: Sign Curve-c2pnb272w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb272w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb272w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb272w1-ec.cert
cert.sh: #244: Import Curve-c2pnb272w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb304w1 --------------------------
certutil -s "CN=Curve-c2pnb304w1, E=Curve-c2pnb304w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb304w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #245: Generate EC Cert Request for Curve-c2pnb304w1 - PASSED
cert.sh: Sign Curve-c2pnb304w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2007 -v 60 -d ../CA -i req -o Curve-c2pnb304w1-ec.cert -f ../tests.pw
cert.sh: #246: Sign Curve-c2pnb304w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb304w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb304w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb304w1-ec.cert
cert.sh: #247: Import Curve-c2pnb304w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb368w1 --------------------------
certutil -s "CN=Curve-c2pnb368w1, E=Curve-c2pnb368w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb368w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #248: Generate EC Cert Request for Curve-c2pnb368w1 - PASSED
cert.sh: Sign Curve-c2pnb368w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2008 -v 60 -d ../CA -i req -o Curve-c2pnb368w1-ec.cert -f ../tests.pw
cert.sh: #249: Sign Curve-c2pnb368w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb368w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb368w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb368w1-ec.cert
cert.sh: #250: Import Curve-c2pnb368w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v1 --------------------------
certutil -s "CN=Curve-c2tnb191v1, E=Curve-c2tnb191v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #251: Generate EC Cert Request for Curve-c2tnb191v1 - PASSED
cert.sh: Sign Curve-c2tnb191v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2009 -v 60 -d ../CA -i req -o Curve-c2tnb191v1-ec.cert -f ../tests.pw
cert.sh: #252: Sign Curve-c2tnb191v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb191v1-ec.cert
cert.sh: #253: Import Curve-c2tnb191v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v2 --------------------------
certutil -s "CN=Curve-c2tnb191v2, E=Curve-c2tnb191v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #254: Generate EC Cert Request for Curve-c2tnb191v2 - PASSED
cert.sh: Sign Curve-c2tnb191v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2010 -v 60 -d ../CA -i req -o Curve-c2tnb191v2-ec.cert -f ../tests.pw
cert.sh: #255: Sign Curve-c2tnb191v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb191v2-ec.cert
cert.sh: #256: Import Curve-c2tnb191v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v3 --------------------------
certutil -s "CN=Curve-c2tnb191v3, E=Curve-c2tnb191v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #257: Generate EC Cert Request for Curve-c2tnb191v3 - PASSED
cert.sh: Sign Curve-c2tnb191v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2011 -v 60 -d ../CA -i req -o Curve-c2tnb191v3-ec.cert -f ../tests.pw
cert.sh: #258: Sign Curve-c2tnb191v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb191v3-ec.cert
cert.sh: #259: Import Curve-c2tnb191v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v1 --------------------------
certutil -s "CN=Curve-c2tnb239v1, E=Curve-c2tnb239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #260: Generate EC Cert Request for Curve-c2tnb239v1 - PASSED
cert.sh: Sign Curve-c2tnb239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2012 -v 60 -d ../CA -i req -o Curve-c2tnb239v1-ec.cert -f ../tests.pw
cert.sh: #261: Sign Curve-c2tnb239v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb239v1-ec.cert
cert.sh: #262: Import Curve-c2tnb239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v2 --------------------------
certutil -s "CN=Curve-c2tnb239v2, E=Curve-c2tnb239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #263: Generate EC Cert Request for Curve-c2tnb239v2 - PASSED
cert.sh: Sign Curve-c2tnb239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2013 -v 60 -d ../CA -i req -o Curve-c2tnb239v2-ec.cert -f ../tests.pw
cert.sh: #264: Sign Curve-c2tnb239v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb239v2-ec.cert
cert.sh: #265: Import Curve-c2tnb239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v3 --------------------------
certutil -s "CN=Curve-c2tnb239v3, E=Curve-c2tnb239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #266: Generate EC Cert Request for Curve-c2tnb239v3 - PASSED
cert.sh: Sign Curve-c2tnb239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2014 -v 60 -d ../CA -i req -o Curve-c2tnb239v3-ec.cert -f ../tests.pw
cert.sh: #267: Sign Curve-c2tnb239v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb239v3-ec.cert
cert.sh: #268: Import Curve-c2tnb239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb359v1 --------------------------
certutil -s "CN=Curve-c2tnb359v1, E=Curve-c2tnb359v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb359v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #269: Generate EC Cert Request for Curve-c2tnb359v1 - PASSED
cert.sh: Sign Curve-c2tnb359v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2015 -v 60 -d ../CA -i req -o Curve-c2tnb359v1-ec.cert -f ../tests.pw
cert.sh: #270: Sign Curve-c2tnb359v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb359v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb359v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb359v1-ec.cert
cert.sh: #271: Import Curve-c2tnb359v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb431r1 --------------------------
certutil -s "CN=Curve-c2tnb431r1, E=Curve-c2tnb431r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb431r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #272: Generate EC Cert Request for Curve-c2tnb431r1 - PASSED
cert.sh: Sign Curve-c2tnb431r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2016 -v 60 -d ../CA -i req -o Curve-c2tnb431r1-ec.cert -f ../tests.pw
cert.sh: #273: Sign Curve-c2tnb431r1's EC Request - PASSED
cert.sh: Import Curve-c2tnb431r1's EC Cert --------------------------
certutil -A -n Curve-c2tnb431r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb431r1-ec.cert
cert.sh: #274: Import Curve-c2tnb431r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb163 --------------------------
certutil -s "CN=Curve-nistb163, E=Curve-nistb163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb163 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #275: Generate EC Cert Request for Curve-nistb163 - PASSED
cert.sh: Sign Curve-nistb163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2017 -v 60 -d ../CA -i req -o Curve-nistb163-ec.cert -f ../tests.pw
cert.sh: #276: Sign Curve-nistb163's EC Request - PASSED
cert.sh: Import Curve-nistb163's EC Cert --------------------------
certutil -A -n Curve-nistb163-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistb163-ec.cert
cert.sh: #277: Import Curve-nistb163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb233 --------------------------
certutil -s "CN=Curve-nistb233, E=Curve-nistb233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb233 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #278: Generate EC Cert Request for Curve-nistb233 - PASSED
cert.sh: Sign Curve-nistb233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2018 -v 60 -d ../CA -i req -o Curve-nistb233-ec.cert -f ../tests.pw
cert.sh: #279: Sign Curve-nistb233's EC Request - PASSED
cert.sh: Import Curve-nistb233's EC Cert --------------------------
certutil -A -n Curve-nistb233-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistb233-ec.cert
cert.sh: #280: Import Curve-nistb233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb283 --------------------------
certutil -s "CN=Curve-nistb283, E=Curve-nistb283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb283 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #281: Generate EC Cert Request for Curve-nistb283 - PASSED
cert.sh: Sign Curve-nistb283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2019 -v 60 -d ../CA -i req -o Curve-nistb283-ec.cert -f ../tests.pw
cert.sh: #282: Sign Curve-nistb283's EC Request - PASSED
cert.sh: Import Curve-nistb283's EC Cert --------------------------
certutil -A -n Curve-nistb283-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistb283-ec.cert
cert.sh: #283: Import Curve-nistb283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb409 --------------------------
certutil -s "CN=Curve-nistb409, E=Curve-nistb409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb409 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #284: Generate EC Cert Request for Curve-nistb409 - PASSED
cert.sh: Sign Curve-nistb409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2020 -v 60 -d ../CA -i req -o Curve-nistb409-ec.cert -f ../tests.pw
cert.sh: #285: Sign Curve-nistb409's EC Request - PASSED
cert.sh: Import Curve-nistb409's EC Cert --------------------------
certutil -A -n Curve-nistb409-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistb409-ec.cert
cert.sh: #286: Import Curve-nistb409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb571 --------------------------
certutil -s "CN=Curve-nistb571, E=Curve-nistb571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb571 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #287: Generate EC Cert Request for Curve-nistb571 - PASSED
cert.sh: Sign Curve-nistb571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2021 -v 60 -d ../CA -i req -o Curve-nistb571-ec.cert -f ../tests.pw
cert.sh: #288: Sign Curve-nistb571's EC Request - PASSED
cert.sh: Import Curve-nistb571's EC Cert --------------------------
certutil -A -n Curve-nistb571-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistb571-ec.cert
cert.sh: #289: Import Curve-nistb571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk163 --------------------------
certutil -s "CN=Curve-nistk163, E=Curve-nistk163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk163 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #290: Generate EC Cert Request for Curve-nistk163 - PASSED
cert.sh: Sign Curve-nistk163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2022 -v 60 -d ../CA -i req -o Curve-nistk163-ec.cert -f ../tests.pw
cert.sh: #291: Sign Curve-nistk163's EC Request - PASSED
cert.sh: Import Curve-nistk163's EC Cert --------------------------
certutil -A -n Curve-nistk163-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistk163-ec.cert
cert.sh: #292: Import Curve-nistk163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk233 --------------------------
certutil -s "CN=Curve-nistk233, E=Curve-nistk233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk233 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #293: Generate EC Cert Request for Curve-nistk233 - PASSED
cert.sh: Sign Curve-nistk233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2023 -v 60 -d ../CA -i req -o Curve-nistk233-ec.cert -f ../tests.pw
cert.sh: #294: Sign Curve-nistk233's EC Request - PASSED
cert.sh: Import Curve-nistk233's EC Cert --------------------------
certutil -A -n Curve-nistk233-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistk233-ec.cert
cert.sh: #295: Import Curve-nistk233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk283 --------------------------
certutil -s "CN=Curve-nistk283, E=Curve-nistk283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk283 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #296: Generate EC Cert Request for Curve-nistk283 - PASSED
cert.sh: Sign Curve-nistk283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2024 -v 60 -d ../CA -i req -o Curve-nistk283-ec.cert -f ../tests.pw
cert.sh: #297: Sign Curve-nistk283's EC Request - PASSED
cert.sh: Import Curve-nistk283's EC Cert --------------------------
certutil -A -n Curve-nistk283-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistk283-ec.cert
cert.sh: #298: Import Curve-nistk283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk409 --------------------------
certutil -s "CN=Curve-nistk409, E=Curve-nistk409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk409 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #299: Generate EC Cert Request for Curve-nistk409 - PASSED
cert.sh: Sign Curve-nistk409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2025 -v 60 -d ../CA -i req -o Curve-nistk409-ec.cert -f ../tests.pw
cert.sh: #300: Sign Curve-nistk409's EC Request - PASSED
cert.sh: Import Curve-nistk409's EC Cert --------------------------
certutil -A -n Curve-nistk409-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistk409-ec.cert
cert.sh: #301: Import Curve-nistk409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk571 --------------------------
certutil -s "CN=Curve-nistk571, E=Curve-nistk571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk571 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #302: Generate EC Cert Request for Curve-nistk571 - PASSED
cert.sh: Sign Curve-nistk571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2026 -v 60 -d ../CA -i req -o Curve-nistk571-ec.cert -f ../tests.pw
cert.sh: #303: Sign Curve-nistk571's EC Request - PASSED
cert.sh: Import Curve-nistk571's EC Cert --------------------------
certutil -A -n Curve-nistk571-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistk571-ec.cert
cert.sh: #304: Import Curve-nistk571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp192 --------------------------
certutil -s "CN=Curve-nistp192, E=Curve-nistp192-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp192 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #305: Generate EC Cert Request for Curve-nistp192 - PASSED
cert.sh: Sign Curve-nistp192's EC Request --------------------------
certutil -C -c TestCA-ec -m 2027 -v 60 -d ../CA -i req -o Curve-nistp192-ec.cert -f ../tests.pw
cert.sh: #306: Sign Curve-nistp192's EC Request - PASSED
cert.sh: Import Curve-nistp192's EC Cert --------------------------
certutil -A -n Curve-nistp192-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistp192-ec.cert
cert.sh: #307: Import Curve-nistp192's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp224 --------------------------
certutil -s "CN=Curve-nistp224, E=Curve-nistp224-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp224 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #308: Generate EC Cert Request for Curve-nistp224 - PASSED
cert.sh: Sign Curve-nistp224's EC Request --------------------------
certutil -C -c TestCA-ec -m 2028 -v 60 -d ../CA -i req -o Curve-nistp224-ec.cert -f ../tests.pw
cert.sh: #309: Sign Curve-nistp224's EC Request - PASSED
cert.sh: Import Curve-nistp224's EC Cert --------------------------
certutil -A -n Curve-nistp224-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistp224-ec.cert
cert.sh: #310: Import Curve-nistp224's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp256 --------------------------
certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #311: Generate EC Cert Request for Curve-nistp256 - PASSED
cert.sh: Sign Curve-nistp256's EC Request --------------------------
certutil -C -c TestCA-ec -m 2029 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw
cert.sh: #312: Sign Curve-nistp256's EC Request - PASSED
cert.sh: Import Curve-nistp256's EC Cert --------------------------
certutil -A -n Curve-nistp256-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert
cert.sh: #313: Import Curve-nistp256's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp384 --------------------------
certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #314: Generate EC Cert Request for Curve-nistp384 - PASSED
cert.sh: Sign Curve-nistp384's EC Request --------------------------
certutil -C -c TestCA-ec -m 2030 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw
cert.sh: #315: Sign Curve-nistp384's EC Request - PASSED
cert.sh: Import Curve-nistp384's EC Cert --------------------------
certutil -A -n Curve-nistp384-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert
cert.sh: #316: Import Curve-nistp384's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp521 --------------------------
certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #317: Generate EC Cert Request for Curve-nistp521 - PASSED
cert.sh: Sign Curve-nistp521's EC Request --------------------------
certutil -C -c TestCA-ec -m 2031 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw
cert.sh: #318: Sign Curve-nistp521's EC Request - PASSED
cert.sh: Import Curve-nistp521's EC Cert --------------------------
certutil -A -n Curve-nistp521-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert
cert.sh: #319: Import Curve-nistp521's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v1 --------------------------
certutil -s "CN=Curve-prime192v1, E=Curve-prime192v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #320: Generate EC Cert Request for Curve-prime192v1 - PASSED
cert.sh: Sign Curve-prime192v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2032 -v 60 -d ../CA -i req -o Curve-prime192v1-ec.cert -f ../tests.pw
cert.sh: #321: Sign Curve-prime192v1's EC Request - PASSED
cert.sh: Import Curve-prime192v1's EC Cert --------------------------
certutil -A -n Curve-prime192v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime192v1-ec.cert
cert.sh: #322: Import Curve-prime192v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v2 --------------------------
certutil -s "CN=Curve-prime192v2, E=Curve-prime192v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #323: Generate EC Cert Request for Curve-prime192v2 - PASSED
cert.sh: Sign Curve-prime192v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2033 -v 60 -d ../CA -i req -o Curve-prime192v2-ec.cert -f ../tests.pw
cert.sh: #324: Sign Curve-prime192v2's EC Request - PASSED
cert.sh: Import Curve-prime192v2's EC Cert --------------------------
certutil -A -n Curve-prime192v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime192v2-ec.cert
cert.sh: #325: Import Curve-prime192v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v3 --------------------------
certutil -s "CN=Curve-prime192v3, E=Curve-prime192v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #326: Generate EC Cert Request for Curve-prime192v3 - PASSED
cert.sh: Sign Curve-prime192v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2034 -v 60 -d ../CA -i req -o Curve-prime192v3-ec.cert -f ../tests.pw
cert.sh: #327: Sign Curve-prime192v3's EC Request - PASSED
cert.sh: Import Curve-prime192v3's EC Cert --------------------------
certutil -A -n Curve-prime192v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime192v3-ec.cert
cert.sh: #328: Import Curve-prime192v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v1 --------------------------
certutil -s "CN=Curve-prime239v1, E=Curve-prime239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #329: Generate EC Cert Request for Curve-prime239v1 - PASSED
cert.sh: Sign Curve-prime239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2035 -v 60 -d ../CA -i req -o Curve-prime239v1-ec.cert -f ../tests.pw
cert.sh: #330: Sign Curve-prime239v1's EC Request - PASSED
cert.sh: Import Curve-prime239v1's EC Cert --------------------------
certutil -A -n Curve-prime239v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime239v1-ec.cert
cert.sh: #331: Import Curve-prime239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v2 --------------------------
certutil -s "CN=Curve-prime239v2, E=Curve-prime239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #332: Generate EC Cert Request for Curve-prime239v2 - PASSED
cert.sh: Sign Curve-prime239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2036 -v 60 -d ../CA -i req -o Curve-prime239v2-ec.cert -f ../tests.pw
cert.sh: #333: Sign Curve-prime239v2's EC Request - PASSED
cert.sh: Import Curve-prime239v2's EC Cert --------------------------
certutil -A -n Curve-prime239v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime239v2-ec.cert
cert.sh: #334: Import Curve-prime239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v3 --------------------------
certutil -s "CN=Curve-prime239v3, E=Curve-prime239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #335: Generate EC Cert Request for Curve-prime239v3 - PASSED
cert.sh: Sign Curve-prime239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2037 -v 60 -d ../CA -i req -o Curve-prime239v3-ec.cert -f ../tests.pw
cert.sh: #336: Sign Curve-prime239v3's EC Request - PASSED
cert.sh: Import Curve-prime239v3's EC Cert --------------------------
certutil -A -n Curve-prime239v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime239v3-ec.cert
cert.sh: #337: Import Curve-prime239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r1 --------------------------
certutil -s "CN=Curve-secp112r1, E=Curve-secp112r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #338: Generate EC Cert Request for Curve-secp112r1 - PASSED
cert.sh: Sign Curve-secp112r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2038 -v 60 -d ../CA -i req -o Curve-secp112r1-ec.cert -f ../tests.pw
cert.sh: #339: Sign Curve-secp112r1's EC Request - PASSED
cert.sh: Import Curve-secp112r1's EC Cert --------------------------
certutil -A -n Curve-secp112r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp112r1-ec.cert
cert.sh: #340: Import Curve-secp112r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r2 --------------------------
certutil -s "CN=Curve-secp112r2, E=Curve-secp112r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #341: Generate EC Cert Request for Curve-secp112r2 - PASSED
cert.sh: Sign Curve-secp112r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2039 -v 60 -d ../CA -i req -o Curve-secp112r2-ec.cert -f ../tests.pw
cert.sh: #342: Sign Curve-secp112r2's EC Request - PASSED
cert.sh: Import Curve-secp112r2's EC Cert --------------------------
certutil -A -n Curve-secp112r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp112r2-ec.cert
cert.sh: #343: Import Curve-secp112r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r1 --------------------------
certutil -s "CN=Curve-secp128r1, E=Curve-secp128r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #344: Generate EC Cert Request for Curve-secp128r1 - PASSED
cert.sh: Sign Curve-secp128r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2040 -v 60 -d ../CA -i req -o Curve-secp128r1-ec.cert -f ../tests.pw
cert.sh: #345: Sign Curve-secp128r1's EC Request - PASSED
cert.sh: Import Curve-secp128r1's EC Cert --------------------------
certutil -A -n Curve-secp128r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp128r1-ec.cert
cert.sh: #346: Import Curve-secp128r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r2 --------------------------
certutil -s "CN=Curve-secp128r2, E=Curve-secp128r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #347: Generate EC Cert Request for Curve-secp128r2 - PASSED
cert.sh: Sign Curve-secp128r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2041 -v 60 -d ../CA -i req -o Curve-secp128r2-ec.cert -f ../tests.pw
cert.sh: #348: Sign Curve-secp128r2's EC Request - PASSED
cert.sh: Import Curve-secp128r2's EC Cert --------------------------
certutil -A -n Curve-secp128r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp128r2-ec.cert
cert.sh: #349: Import Curve-secp128r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160k1 --------------------------
certutil -s "CN=Curve-secp160k1, E=Curve-secp160k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #350: Generate EC Cert Request for Curve-secp160k1 - PASSED
cert.sh: Sign Curve-secp160k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2042 -v 60 -d ../CA -i req -o Curve-secp160k1-ec.cert -f ../tests.pw
cert.sh: #351: Sign Curve-secp160k1's EC Request - PASSED
cert.sh: Import Curve-secp160k1's EC Cert --------------------------
certutil -A -n Curve-secp160k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp160k1-ec.cert
cert.sh: #352: Import Curve-secp160k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r1 --------------------------
certutil -s "CN=Curve-secp160r1, E=Curve-secp160r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #353: Generate EC Cert Request for Curve-secp160r1 - PASSED
cert.sh: Sign Curve-secp160r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2043 -v 60 -d ../CA -i req -o Curve-secp160r1-ec.cert -f ../tests.pw
cert.sh: #354: Sign Curve-secp160r1's EC Request - PASSED
cert.sh: Import Curve-secp160r1's EC Cert --------------------------
certutil -A -n Curve-secp160r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp160r1-ec.cert
cert.sh: #355: Import Curve-secp160r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r2 --------------------------
certutil -s "CN=Curve-secp160r2, E=Curve-secp160r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #356: Generate EC Cert Request for Curve-secp160r2 - PASSED
cert.sh: Sign Curve-secp160r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2044 -v 60 -d ../CA -i req -o Curve-secp160r2-ec.cert -f ../tests.pw
cert.sh: #357: Sign Curve-secp160r2's EC Request - PASSED
cert.sh: Import Curve-secp160r2's EC Cert --------------------------
certutil -A -n Curve-secp160r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp160r2-ec.cert
cert.sh: #358: Import Curve-secp160r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192k1 --------------------------
certutil -s "CN=Curve-secp192k1, E=Curve-secp192k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #359: Generate EC Cert Request for Curve-secp192k1 - PASSED
cert.sh: Sign Curve-secp192k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2045 -v 60 -d ../CA -i req -o Curve-secp192k1-ec.cert -f ../tests.pw
cert.sh: #360: Sign Curve-secp192k1's EC Request - PASSED
cert.sh: Import Curve-secp192k1's EC Cert --------------------------
certutil -A -n Curve-secp192k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp192k1-ec.cert
cert.sh: #361: Import Curve-secp192k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192r1 --------------------------
certutil -s "CN=Curve-secp192r1, E=Curve-secp192r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #362: Generate EC Cert Request for Curve-secp192r1 - PASSED
cert.sh: Sign Curve-secp192r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2046 -v 60 -d ../CA -i req -o Curve-secp192r1-ec.cert -f ../tests.pw
cert.sh: #363: Sign Curve-secp192r1's EC Request - PASSED
cert.sh: Import Curve-secp192r1's EC Cert --------------------------
certutil -A -n Curve-secp192r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp192r1-ec.cert
cert.sh: #364: Import Curve-secp192r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224k1 --------------------------
certutil -s "CN=Curve-secp224k1, E=Curve-secp224k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #365: Generate EC Cert Request for Curve-secp224k1 - PASSED
cert.sh: Sign Curve-secp224k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2047 -v 60 -d ../CA -i req -o Curve-secp224k1-ec.cert -f ../tests.pw
cert.sh: #366: Sign Curve-secp224k1's EC Request - PASSED
cert.sh: Import Curve-secp224k1's EC Cert --------------------------
certutil -A -n Curve-secp224k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp224k1-ec.cert
cert.sh: #367: Import Curve-secp224k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224r1 --------------------------
certutil -s "CN=Curve-secp224r1, E=Curve-secp224r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #368: Generate EC Cert Request for Curve-secp224r1 - PASSED
cert.sh: Sign Curve-secp224r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2048 -v 60 -d ../CA -i req -o Curve-secp224r1-ec.cert -f ../tests.pw
cert.sh: #369: Sign Curve-secp224r1's EC Request - PASSED
cert.sh: Import Curve-secp224r1's EC Cert --------------------------
certutil -A -n Curve-secp224r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp224r1-ec.cert
cert.sh: #370: Import Curve-secp224r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256k1 --------------------------
certutil -s "CN=Curve-secp256k1, E=Curve-secp256k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #371: Generate EC Cert Request for Curve-secp256k1 - PASSED
cert.sh: Sign Curve-secp256k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2049 -v 60 -d ../CA -i req -o Curve-secp256k1-ec.cert -f ../tests.pw
cert.sh: #372: Sign Curve-secp256k1's EC Request - PASSED
cert.sh: Import Curve-secp256k1's EC Cert --------------------------
certutil -A -n Curve-secp256k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp256k1-ec.cert
cert.sh: #373: Import Curve-secp256k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256r1 --------------------------
certutil -s "CN=Curve-secp256r1, E=Curve-secp256r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #374: Generate EC Cert Request for Curve-secp256r1 - PASSED
cert.sh: Sign Curve-secp256r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2050 -v 60 -d ../CA -i req -o Curve-secp256r1-ec.cert -f ../tests.pw
cert.sh: #375: Sign Curve-secp256r1's EC Request - PASSED
cert.sh: Import Curve-secp256r1's EC Cert --------------------------
certutil -A -n Curve-secp256r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp256r1-ec.cert
cert.sh: #376: Import Curve-secp256r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp384r1 --------------------------
certutil -s "CN=Curve-secp384r1, E=Curve-secp384r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #377: Generate EC Cert Request for Curve-secp384r1 - PASSED
cert.sh: Sign Curve-secp384r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2051 -v 60 -d ../CA -i req -o Curve-secp384r1-ec.cert -f ../tests.pw
cert.sh: #378: Sign Curve-secp384r1's EC Request - PASSED
cert.sh: Import Curve-secp384r1's EC Cert --------------------------
certutil -A -n Curve-secp384r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp384r1-ec.cert
cert.sh: #379: Import Curve-secp384r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp521r1 --------------------------
certutil -s "CN=Curve-secp521r1, E=Curve-secp521r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp521r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #380: Generate EC Cert Request for Curve-secp521r1 - PASSED
cert.sh: Sign Curve-secp521r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2052 -v 60 -d ../CA -i req -o Curve-secp521r1-ec.cert -f ../tests.pw
cert.sh: #381: Sign Curve-secp521r1's EC Request - PASSED
cert.sh: Import Curve-secp521r1's EC Cert --------------------------
certutil -A -n Curve-secp521r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp521r1-ec.cert
cert.sh: #382: Import Curve-secp521r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r1 --------------------------
certutil -s "CN=Curve-sect113r1, E=Curve-sect113r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #383: Generate EC Cert Request for Curve-sect113r1 - PASSED
cert.sh: Sign Curve-sect113r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2053 -v 60 -d ../CA -i req -o Curve-sect113r1-ec.cert -f ../tests.pw
cert.sh: #384: Sign Curve-sect113r1's EC Request - PASSED
cert.sh: Import Curve-sect113r1's EC Cert --------------------------
certutil -A -n Curve-sect113r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect113r1-ec.cert
cert.sh: #385: Import Curve-sect113r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r2 --------------------------
certutil -s "CN=Curve-sect113r2, E=Curve-sect113r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #386: Generate EC Cert Request for Curve-sect113r2 - PASSED
cert.sh: Sign Curve-sect113r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2054 -v 60 -d ../CA -i req -o Curve-sect113r2-ec.cert -f ../tests.pw
cert.sh: #387: Sign Curve-sect113r2's EC Request - PASSED
cert.sh: Import Curve-sect113r2's EC Cert --------------------------
certutil -A -n Curve-sect113r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect113r2-ec.cert
cert.sh: #388: Import Curve-sect113r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r1 --------------------------
certutil -s "CN=Curve-sect131r1, E=Curve-sect131r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #389: Generate EC Cert Request for Curve-sect131r1 - PASSED
cert.sh: Sign Curve-sect131r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2055 -v 60 -d ../CA -i req -o Curve-sect131r1-ec.cert -f ../tests.pw
cert.sh: #390: Sign Curve-sect131r1's EC Request - PASSED
cert.sh: Import Curve-sect131r1's EC Cert --------------------------
certutil -A -n Curve-sect131r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect131r1-ec.cert
cert.sh: #391: Import Curve-sect131r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r2 --------------------------
certutil -s "CN=Curve-sect131r2, E=Curve-sect131r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #392: Generate EC Cert Request for Curve-sect131r2 - PASSED
cert.sh: Sign Curve-sect131r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2056 -v 60 -d ../CA -i req -o Curve-sect131r2-ec.cert -f ../tests.pw
cert.sh: #393: Sign Curve-sect131r2's EC Request - PASSED
cert.sh: Import Curve-sect131r2's EC Cert --------------------------
certutil -A -n Curve-sect131r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect131r2-ec.cert
cert.sh: #394: Import Curve-sect131r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163k1 --------------------------
certutil -s "CN=Curve-sect163k1, E=Curve-sect163k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #395: Generate EC Cert Request for Curve-sect163k1 - PASSED
cert.sh: Sign Curve-sect163k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2057 -v 60 -d ../CA -i req -o Curve-sect163k1-ec.cert -f ../tests.pw
cert.sh: #396: Sign Curve-sect163k1's EC Request - PASSED
cert.sh: Import Curve-sect163k1's EC Cert --------------------------
certutil -A -n Curve-sect163k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect163k1-ec.cert
cert.sh: #397: Import Curve-sect163k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r1 --------------------------
certutil -s "CN=Curve-sect163r1, E=Curve-sect163r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #398: Generate EC Cert Request for Curve-sect163r1 - PASSED
cert.sh: Sign Curve-sect163r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2058 -v 60 -d ../CA -i req -o Curve-sect163r1-ec.cert -f ../tests.pw
cert.sh: #399: Sign Curve-sect163r1's EC Request - PASSED
cert.sh: Import Curve-sect163r1's EC Cert --------------------------
certutil -A -n Curve-sect163r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect163r1-ec.cert
cert.sh: #400: Import Curve-sect163r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r2 --------------------------
certutil -s "CN=Curve-sect163r2, E=Curve-sect163r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #401: Generate EC Cert Request for Curve-sect163r2 - PASSED
cert.sh: Sign Curve-sect163r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2059 -v 60 -d ../CA -i req -o Curve-sect163r2-ec.cert -f ../tests.pw
cert.sh: #402: Sign Curve-sect163r2's EC Request - PASSED
cert.sh: Import Curve-sect163r2's EC Cert --------------------------
certutil -A -n Curve-sect163r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect163r2-ec.cert
cert.sh: #403: Import Curve-sect163r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r1 --------------------------
certutil -s "CN=Curve-sect193r1, E=Curve-sect193r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #404: Generate EC Cert Request for Curve-sect193r1 - PASSED
cert.sh: Sign Curve-sect193r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2060 -v 60 -d ../CA -i req -o Curve-sect193r1-ec.cert -f ../tests.pw
cert.sh: #405: Sign Curve-sect193r1's EC Request - PASSED
cert.sh: Import Curve-sect193r1's EC Cert --------------------------
certutil -A -n Curve-sect193r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect193r1-ec.cert
cert.sh: #406: Import Curve-sect193r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r2 --------------------------
certutil -s "CN=Curve-sect193r2, E=Curve-sect193r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #407: Generate EC Cert Request for Curve-sect193r2 - PASSED
cert.sh: Sign Curve-sect193r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2061 -v 60 -d ../CA -i req -o Curve-sect193r2-ec.cert -f ../tests.pw
cert.sh: #408: Sign Curve-sect193r2's EC Request - PASSED
cert.sh: Import Curve-sect193r2's EC Cert --------------------------
certutil -A -n Curve-sect193r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect193r2-ec.cert
cert.sh: #409: Import Curve-sect193r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233k1 --------------------------
certutil -s "CN=Curve-sect233k1, E=Curve-sect233k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #410: Generate EC Cert Request for Curve-sect233k1 - PASSED
cert.sh: Sign Curve-sect233k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2062 -v 60 -d ../CA -i req -o Curve-sect233k1-ec.cert -f ../tests.pw
cert.sh: #411: Sign Curve-sect233k1's EC Request - PASSED
cert.sh: Import Curve-sect233k1's EC Cert --------------------------
certutil -A -n Curve-sect233k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect233k1-ec.cert
cert.sh: #412: Import Curve-sect233k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233r1 --------------------------
certutil -s "CN=Curve-sect233r1, E=Curve-sect233r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #413: Generate EC Cert Request for Curve-sect233r1 - PASSED
cert.sh: Sign Curve-sect233r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2063 -v 60 -d ../CA -i req -o Curve-sect233r1-ec.cert -f ../tests.pw
cert.sh: #414: Sign Curve-sect233r1's EC Request - PASSED
cert.sh: Import Curve-sect233r1's EC Cert --------------------------
certutil -A -n Curve-sect233r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect233r1-ec.cert
cert.sh: #415: Import Curve-sect233r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect239k1 --------------------------
certutil -s "CN=Curve-sect239k1, E=Curve-sect239k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect239k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #416: Generate EC Cert Request for Curve-sect239k1 - PASSED
cert.sh: Sign Curve-sect239k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2064 -v 60 -d ../CA -i req -o Curve-sect239k1-ec.cert -f ../tests.pw
cert.sh: #417: Sign Curve-sect239k1's EC Request - PASSED
cert.sh: Import Curve-sect239k1's EC Cert --------------------------
certutil -A -n Curve-sect239k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect239k1-ec.cert
cert.sh: #418: Import Curve-sect239k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283k1 --------------------------
certutil -s "CN=Curve-sect283k1, E=Curve-sect283k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #419: Generate EC Cert Request for Curve-sect283k1 - PASSED
cert.sh: Sign Curve-sect283k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2065 -v 60 -d ../CA -i req -o Curve-sect283k1-ec.cert -f ../tests.pw
cert.sh: #420: Sign Curve-sect283k1's EC Request - PASSED
cert.sh: Import Curve-sect283k1's EC Cert --------------------------
certutil -A -n Curve-sect283k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect283k1-ec.cert
cert.sh: #421: Import Curve-sect283k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283r1 --------------------------
certutil -s "CN=Curve-sect283r1, E=Curve-sect283r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #422: Generate EC Cert Request for Curve-sect283r1 - PASSED
cert.sh: Sign Curve-sect283r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2066 -v 60 -d ../CA -i req -o Curve-sect283r1-ec.cert -f ../tests.pw
cert.sh: #423: Sign Curve-sect283r1's EC Request - PASSED
cert.sh: Import Curve-sect283r1's EC Cert --------------------------
certutil -A -n Curve-sect283r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect283r1-ec.cert
cert.sh: #424: Import Curve-sect283r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409k1 --------------------------
certutil -s "CN=Curve-sect409k1, E=Curve-sect409k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #425: Generate EC Cert Request for Curve-sect409k1 - PASSED
cert.sh: Sign Curve-sect409k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2067 -v 60 -d ../CA -i req -o Curve-sect409k1-ec.cert -f ../tests.pw
cert.sh: #426: Sign Curve-sect409k1's EC Request - PASSED
cert.sh: Import Curve-sect409k1's EC Cert --------------------------
certutil -A -n Curve-sect409k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect409k1-ec.cert
cert.sh: #427: Import Curve-sect409k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409r1 --------------------------
certutil -s "CN=Curve-sect409r1, E=Curve-sect409r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #428: Generate EC Cert Request for Curve-sect409r1 - PASSED
cert.sh: Sign Curve-sect409r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2068 -v 60 -d ../CA -i req -o Curve-sect409r1-ec.cert -f ../tests.pw
cert.sh: #429: Sign Curve-sect409r1's EC Request - PASSED
cert.sh: Import Curve-sect409r1's EC Cert --------------------------
certutil -A -n Curve-sect409r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect409r1-ec.cert
cert.sh: #430: Import Curve-sect409r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571k1 --------------------------
certutil -s "CN=Curve-sect571k1, E=Curve-sect571k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #431: Generate EC Cert Request for Curve-sect571k1 - PASSED
cert.sh: Sign Curve-sect571k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2069 -v 60 -d ../CA -i req -o Curve-sect571k1-ec.cert -f ../tests.pw
cert.sh: #432: Sign Curve-sect571k1's EC Request - PASSED
cert.sh: Import Curve-sect571k1's EC Cert --------------------------
certutil -A -n Curve-sect571k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect571k1-ec.cert
cert.sh: #433: Import Curve-sect571k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571r1 --------------------------
certutil -s "CN=Curve-sect571r1, E=Curve-sect571r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #434: Generate EC Cert Request for Curve-sect571r1 - PASSED
cert.sh: Sign Curve-sect571r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2070 -v 60 -d ../CA -i req -o Curve-sect571r1-ec.cert -f ../tests.pw
cert.sh: #435: Sign Curve-sect571r1's EC Request - PASSED
cert.sh: Import Curve-sect571r1's EC Cert --------------------------
certutil -A -n Curve-sect571r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect571r1-ec.cert
cert.sh: #436: Import Curve-sect571r1's EC Cert - PASSED
cert.sh: Initializing TestExt's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw
cert.sh: #437: Initializing TestExt's Cert DB - PASSED
cert.sh: Loading root cert module to TestExt's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #438: Loading root cert module to TestExt's Cert DB - PASSED
cert.sh: Import Root CA for TestExt --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -i ../CA/TestCA.ca.cert
cert.sh: #439: Import Root CA for TestExt - PASSED
cert.sh: Import EC Root CA for TestExt --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -i ../CA/TestCA-ec.ca.cert
cert.sh: #440: Import EC Root CA for TestExt - PASSED
cert.sh: Generate Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #441: Generate Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's Request --------------------------
certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw
cert.sh: #442: Sign TestExt's Request - PASSED
cert.sh: Import TestExt's Cert --------------------------
certutil -A -n TestExt -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -i TestExt.cert
cert.sh: #443: Import TestExt's Cert - PASSED
cert.sh SUCCESS: TestExt's Cert Created
cert.sh: Generate EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #444: Generate EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request --------------------------
certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw
cert.sh: #445: Sign TestExt's EC Request - PASSED
cert.sh: Import TestExt's EC Cert --------------------------
certutil -A -n TestExt-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert
cert.sh: #446: Import TestExt's EC Cert - PASSED
cert.sh SUCCESS: TestExt's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #447: Generate mixed EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw
cert.sh: #448: Sign TestExt's EC Request with RSA - PASSED
cert.sh: Import TestExt's mixed EC Cert --------------------------
certutil -A -n TestExt-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert
cert.sh: #449: Import TestExt's mixed EC Cert - PASSED
cert.sh SUCCESS: TestExt's mixed EC Cert Created
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
n
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt1
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:59:30
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Tue Nov 27 23:55:40 2012
Not After : Wed Feb 27 23:55:40 2013
Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
be:2e:6e:31:c2:3e:fc:c4:b5:1f:44:ca:3d:6f:3a:5e:
d7:f2:3f:f8:69:6a:a9:43:5d:84:ef:e2:9e:7f:4d:3e:
16:c4:46:3f:b3:50:4a:7f:e7:e7:44:93:43:0d:a8:44:
c8:84:c1:c0:32:c3:1d:58:61:d1:c9:09:b5:a4:9d:12:
31:f1:c8:61:7a:cc:8c:4a:3e:e3:6e:fa:3a:4f:33:ed:
65:57:83:63:df:19:6b:f2:61:e0:3b:c3:27:51:c5:c2:
f6:c5:08:a7:e0:90:50:f7:38:be:a3:52:be:90:3e:e1:
42:7e:73:24:b1:f6:a6:ae:f9:cf:7e:ae:c6:8b:e5:27
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Key Usage
Usages: Digital Signature
Non-Repudiation
Key Encipherment
Data Encipherment
Key Agreement
Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
3f:a0:55:fb:30:a2:9c:8e:1b:a3:a5:5f:ee:e3:a9:8d:
03:f8:36:18:67:ec:54:07:be:1f:e2:c6:09:ef:b1:62:
51:27:5f:aa:ae:45:b6:b9:e8:8d:be:d4:49:de:22:62:
76:4d:e8:6b:81:b4:58:83:db:b0:ef:c2:c1:d7:bc:a1:
73:fe:e9:31:e6:c1:01:b5:5b:cf:99:24:38:b6:14:4b:
8c:d5:01:1a:5a:09:2a:5a:e5:fc:a9:f8:b3:0e:28:09:
13:c1:3c:17:b5:b7:c3:d0:2f:50:33:2a:54:1c:70:f1:
79:71:b4:3c:db:40:27:4e:00:ab:d6:fe:e9:58:ac:e9
Fingerprint (MD5):
A0:D8:8B:5A:0F:8E:15:1E:A7:AB:4E:E3:B1:ED:10:E8
Fingerprint (SHA1):
53:3C:1C:09:AB:74:E2:E4:28:10:55:B0:8C:D7:96:41:BE:2F:76:2F
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #450: Certificate Key Usage Extension (1) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt2
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:59:30
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Tue Nov 27 23:55:40 2012
Not After : Wed Feb 27 23:55:40 2013
Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
9f:bc:45:fd:fd:77:5a:49:0b:7b:37:08:5f:6a:6b:5f:
47:be:40:0a:20:df:26:9c:d8:af:d3:bb:3c:74:e4:ce:
24:c1:47:a5:e1:28:31:1f:39:49:b8:ad:41:ab:61:e4:
2a:3f:fc:cd:74:25:f9:f3:08:78:c2:2f:3d:a8:cc:a6:
54:10:65:4d:b9:29:41:03:70:81:d8:4e:77:fd:8f:b6:
6a:ac:91:ba:f5:06:d0:01:2f:96:0d:cd:e1:d7:98:9f:
04:fb:d4:40:76:41:7c:54:a5:32:a7:42:60:7e:e9:86:
6f:0d:b1:a9:a8:b4:51:66:cf:0d:b4:3b:5b:8b:62:75
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Key Usage
Critical: True
Usages: Digital Signature
Non-Repudiation
Key Encipherment
Data Encipherment
Key Agreement
Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
1e:f6:00:5f:08:34:3c:b5:6e:5b:b8:9a:de:b3:40:40:
af:48:0f:bc:ac:0d:74:87:c5:dc:13:cb:2f:4c:fd:1b:
0e:96:84:42:96:3b:f9:18:96:5e:38:5c:a3:6f:56:e3:
59:f8:62:e8:bb:fe:51:5d:98:7d:c4:00:ad:66:9f:69:
30:92:73:d0:35:3b:d4:6e:6d:5a:80:88:de:bb:ad:db:
4f:70:5a:ca:f8:d5:ac:0e:6a:c7:ce:90:cb:18:2f:7c:
a6:4f:1a:93:cd:ab:04:d0:95:e2:f5:b5:5f:35:9f:78:
7d:3f:1e:f3:6f:f6:82:3a:83:92:cb:86:90:9a:10:2e
Fingerprint (MD5):
36:12:5C:FC:5D:7F:BC:BC:27:08:C8:23:59:E6:AE:3E
Fingerprint (SHA1):
95:5C:7F:15:7E:CB:72:C5:C2:77:DA:B5:01:E0:19:00:77:C8:03:FA
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #451: Certificate Key Usage Extension (2) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
y
-1
n
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt3
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:59:31
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Tue Nov 27 23:55:41 2012
Not After : Wed Feb 27 23:55:41 2013
Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:68:d9:f6:45:14:49:07:d0:46:ca:1e:8c:db:7b:3a:
32:34:ee:6a:21:e4:08:61:1d:3a:9e:ec:2f:fe:a0:cb:
e4:bf:d7:d7:1b:ce:d7:42:f5:a3:86:79:4c:e2:00:1d:
83:ed:28:6b:f3:00:43:c3:1e:5a:b0:fd:68:27:b8:f0:
fb:5d:d5:c8:fb:95:72:ef:d3:ba:60:c3:11:4b:4d:a7:
0f:06:e1:cb:39:de:af:7b:02:49:c9:32:67:6e:71:ef:
ad:cc:64:b6:c9:35:e2:f2:96:34:b7:dc:91:13:5b:0d:
89:de:0c:2b:73:ee:db:eb:e3:61:1e:d2:d6:af:6d:0d
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
22:90:b2:8a:1f:f6:7e:0d:56:db:e0:e2:b7:2d:29:40:
6a:12:3a:2d:22:65:79:25:9a:91:0a:41:5b:e9:8d:8d:
ec:c0:ef:00:59:89:b0:84:ea:31:c6:2a:b9:84:52:31:
7a:3e:cc:c1:0e:f9:aa:c7:7d:d0:ea:ad:e1:49:38:a6:
34:8c:73:89:d8:f3:36:73:f8:d2:47:36:86:12:e1:33:
49:19:a6:11:39:50:d9:f5:13:63:bf:c0:10:0a:e0:5f:
11:20:26:2b:cc:44:45:98:29:63:f0:d5:5b:f6:21:c8:
d4:40:14:06:9a:ec:d5:f5:a4:7c:a8:fb:17:4c:ee:b9
Fingerprint (MD5):
0C:05:77:A1:81:CB:D7:73:34:7D:D2:A7:78:87:84:FE
Fingerprint (SHA1):
B0:69:B0:8D:4C:B8:FE:33:18:41:FC:BE:25:79:4F:1D:4C:87:05:E2
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #452: Certificate Basic Constraints Extension (3) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
n
-1
y
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt4
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:59:31
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Tue Nov 27 23:55:41 2012
Not After : Wed Feb 27 23:55:41 2013
Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:8a:ee:a9:ca:47:55:63:1e:4d:2f:9a:e3:e4:c5:b6:
35:af:7f:e0:c6:e3:90:16:ea:6a:cc:a8:bc:1f:04:28:
c6:68:88:d7:6e:8f:05:20:c1:a7:65:0e:6a:be:8e:df:
bb:41:1b:ac:12:b6:9f:a0:2e:ad:9b:dc:27:cd:22:46:
cc:d1:1e:90:9a:d9:fc:21:05:86:73:fe:1f:39:76:d1:
85:12:a6:8e:50:70:cc:62:66:6e:c0:8b:9a:a0:ce:45:
34:c8:f7:bb:cf:70:f1:f6:98:2a:f9:96:37:07:07:5a:
e8:56:65:dd:82:4f:89:0d:ec:14:97:ca:ef:b9:01:09
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is not a CA.
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
45:aa:a7:92:4f:fb:10:62:ad:1b:27:5b:47:2e:4d:ff:
95:c7:5a:7f:6d:60:68:51:bb:ac:d8:b1:61:86:30:7f:
f2:18:b0:5d:e9:d8:51:12:e2:b9:f2:b8:43:41:e4:35:
35:1d:76:90:96:6f:4e:55:0c:64:6a:07:ad:03:a4:33:
03:fc:c0:3b:a4:9e:7a:2b:12:4f:db:6f:cc:30:1a:4d:
59:5a:26:3e:4c:4d:96:39:24:97:96:69:e8:ad:7f:fa:
0f:83:61:d7:f2:be:2b:a9:f3:93:9f:27:72:1a:14:6e:
ee:c3:f3:6e:be:03:90:90:8b:7f:7d:fe:37:a0:a0:1b
Fingerprint (MD5):
22:E5:0B:B1:20:E4:96:9B:D6:CE:DC:73:0B:5E:8D:5E
Fingerprint (SHA1):
C0:F7:E0:6D:AB:A0:95:30:B5:1A:EB:95:A9:97:78:06:59:08:4C:27
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #453: Certificate Basic Constraints Extension (4) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
y
12341235123
y
Generating key. This may take a few moments...
Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt5
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:59:32
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Tue Nov 27 23:55:41 2012
Not After : Wed Feb 27 23:55:41 2013
Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b7:3c:9e:f6:4d:e0:3f:78:55:67:34:91:09:04:ba:a2:
86:4e:21:19:dc:43:42:df:23:30:c7:c7:b7:f6:05:e8:
16:6a:80:70:e8:c3:b1:c8:5c:82:e1:08:7f:30:c6:d8:
5c:b9:dc:90:c1:df:24:cd:23:09:6d:0c:31:ed:ca:9e:
5a:94:f1:28:fe:38:21:ec:6a:14:a8:36:34:63:d8:b5:
95:f8:bf:fa:e5:16:c9:3e:11:d6:07:1d:da:ad:ad:13:
2a:59:e2:1a:cf:93:0a:ec:f3:66:6b:53:9d:e2:ca:fb:
70:bb:aa:2f:02:c3:f5:95:be:87:28:30:75:d8:69:0f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Authority Key Identifier
Critical: True
Key ID:
12341235123
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
32:c8:23:a8:cd:25:d8:92:e1:d2:3d:38:b2:9e:e0:81:
5c:b8:00:98:c0:3e:d8:fa:4a:ad:0a:6c:5c:f5:3f:ad:
60:bf:34:d3:21:72:b4:24:9d:3c:f0:a1:9d:2c:91:a0:
a2:e9:e1:48:d3:86:53:d3:23:48:a8:1b:8a:dc:a5:b9:
fc:7f:13:c5:6e:90:87:f3:b4:1f:30:ed:28:f7:af:0e:
9d:96:64:8d:23:4d:c8:79:f3:33:38:77:f7:0e:4b:c9:
e3:34:e2:bd:d1:d5:82:26:a0:6d:79:06:e0:5c:e4:d0:
6b:89:fa:b9:04:49:76:be:e6:f2:f8:92:fc:6d:ea:4a
Fingerprint (MD5):
A5:98:F9:9D:7D:88:C0:9F:18:36:38:5E:AB:7D:5B:AE
Fingerprint (SHA1):
4C:50:A8:8A:28:B9:C3:9B:91:64:53:95:6B:63:7D:ED:87:DF:B6:E6
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #454: Certificate Authority Key Identifier Extension (5) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
y
3
test.com
214123
y
Generating key. This may take a few moments...
Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt6
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:59:33
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Tue Nov 27 23:55:41 2012
Not After : Wed Feb 27 23:55:41 2013
Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
df:08:d8:67:18:7a:4b:b0:c4:ff:ad:2c:dc:90:1e:cc:
27:16:54:a1:17:d4:47:40:4e:f0:73:d6:4a:58:09:45:
5c:f3:25:2d:ea:61:bf:bb:26:5a:bf:2c:7f:52:4a:fc:
ca:0c:74:12:87:30:43:d2:f4:dc:07:ac:7b:39:e7:f7:
64:9e:74:1e:93:b0:50:99:9d:7b:0a:07:80:26:76:d0:
5f:3a:fc:e9:e6:08:85:bb:0d:dd:ce:25:b4:69:2a:c8:
27:91:ab:2f:75:c0:09:dd:2d:55:04:52:60:7c:88:d0:
dd:33:5e:c2:e4:0a:95:d3:aa:d8:68:09:33:16:21:5f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Authority Key Identifier
Critical: True
Issuer:
DNS name: "test.com"
Serial Number:
214123
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
d8:89:f8:4a:30:48:2e:04:ca:60:d6:9a:6e:37:64:15:
89:44:c9:9b:e7:85:ae:b1:e4:c5:c7:08:c0:d7:3d:a0:
24:2a:cc:82:06:70:d1:27:b4:2d:47:37:70:b1:0e:62:
85:aa:c2:ce:e9:90:1a:0f:59:d8:bf:c9:23:0e:10:84:
ed:89:5a:68:de:16:1c:00:33:2d:9e:b6:88:cc:70:9a:
d5:34:e1:4b:a9:7a:15:95:d1:cf:44:ba:60:b5:d9:d1:
5c:e4:e0:23:92:36:11:40:7a:1a:00:91:8e:94:77:37:
ae:19:ef:35:18:ed:98:73:9a:f7:09:cd:a8:c4:03:1c
Fingerprint (MD5):
20:28:79:DE:71:9C:F4:29:AA:29:A3:13:EB:C2:4F:C8
Fingerprint (SHA1):
F5:04:0E:96:8D:09:FF:8C:AB:47:38:E8:33:77:C9:5C:DA:49:FE:4E
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #455: Certificate Authority Key Identifier Extension (6) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
1
2
rfc822@name.tld
3
test.com
8
1.2.3.4
9
OID.0.2.213
10
0
10
n
n
Generating key. This may take a few moments...
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice: >
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice: > Enter value for the CRL Issuer name:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt7
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:59:33
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Tue Nov 27 23:55:42 2012
Not After : Wed Feb 27 23:55:42 2013
Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
ae:0a:ed:e2:7f:4d:3b:52:ed:3d:95:40:13:c7:11:d6:
67:3e:f3:08:1d:f0:20:37:5c:77:ea:12:c5:80:bf:d4:
73:73:e7:14:d2:db:ac:04:49:db:06:72:18:1d:1e:e3:
65:52:09:9d:8b:af:b6:38:5f:58:cb:f2:c2:99:fc:36:
19:bb:6c:a6:15:e1:dd:c3:75:f0:11:a9:b7:9a:98:dd:
1e:ec:fd:02:01:43:3a:df:33:7a:8d:9a:63:7b:1a:2c:
20:a3:96:5c:67:e5:16:85:f7:62:5b:df:93:d8:0b:52:
bd:d7:a7:ae:04:14:ce:a5:a5:28:c8:ad:64:c5:f8:ad
Exponent: 65537 (0x10001)
Signed Extensions:
Name: CRL Distribution Points
Distribution point:
RFC822 Name: "rfc822@name.tld"
DNS name: "test.com"
IP Address:
87:07:31:2e:32:2e:33:2e:34
Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51
Reasons:
80
(7 least significant bits unused)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
2d:db:c3:3f:1c:be:bc:72:96:26:33:b3:3f:cb:bc:a9:
54:9b:a1:b2:5d:c0:06:0d:74:06:af:f7:60:ef:02:f2:
85:b4:3c:23:ba:e2:3f:be:00:67:ae:f3:4e:21:61:e8:
4c:5e:a2:9f:88:24:d8:e4:93:90:7e:29:f8:31:f4:c7:
7a:8d:13:3c:59:51:36:48:84:94:ed:ca:b6:81:c3:bb:
a4:42:4e:b0:9a:5e:88:1b:6f:1a:1e:ae:c9:d8:dd:f4:
50:cb:38:c1:b6:3f:cd:d8:a6:59:b8:51:f1:9b:8a:ab:
91:a4:6e:6c:2c:5c:4e:4d:d4:66:62:3e:51:e4:1e:f8
Fingerprint (MD5):
B2:AC:AD:D3:D1:7D:EC:06:D5:87:2A:27:71:85:9B:A4
Fingerprint (SHA1):
9C:B5:BF:80:E4:14:5E:D0:F8:E4:7C:CB:D8:24:DB:C2:CE:B4:E4:6C
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #456: CRL Distribution Points Extension (7) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
2
SN=asdfsdf
4
3
test.com
10
n
n
Generating key. This may take a few moments...
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice: > Enter the relative name:
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice: > Enter value for the CRL Issuer name:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt8
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:59:34
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Tue Nov 27 23:55:42 2012
Not After : Wed Feb 27 23:55:42 2013
Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
be:83:ba:d3:0c:f6:ad:28:d5:4c:a5:70:29:9d:1c:4d:
0c:1c:15:18:80:ea:0f:42:b0:29:42:73:a2:05:37:e9:
d1:bc:ff:74:3f:5c:4f:98:25:18:c1:4c:e1:30:71:e4:
bc:90:2c:3d:6e:ca:63:b3:f9:d2:d8:2d:be:a2:72:dd:
4e:66:15:21:bc:b1:c7:c1:3a:94:4d:c0:c7:f6:23:4b:
43:e4:97:5a:8f:d2:a5:47:b5:32:b6:58:3b:60:c8:09:
b3:da:19:3b:98:38:7b:43:b7:49:18:b0:c4:35:4d:b8:
dd:e6:7c:f7:99:3f:1e:8c:89:bb:14:29:4d:27:8d:93
Exponent: 65537 (0x10001)
Signed Extensions:
Name: CRL Distribution Points
Distribution point:
RDN: "SN=asdfsdf"
Reasons:
08
(7 least significant bits unused)
CRL issuer:
DNS name: "test.com"
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
2c:93:1b:77:3c:9b:ae:58:70:61:50:10:1e:be:69:66:
82:2f:1a:64:8f:f6:b4:ee:d4:28:6b:84:51:45:4f:00:
c3:3a:f2:29:5b:7d:e3:5d:dc:f3:40:2e:11:b2:a1:cd:
c7:29:bf:aa:8c:18:c1:73:f0:ed:1a:14:9e:0f:a1:b8:
22:4a:04:0f:2a:41:e7:1b:76:13:12:f8:16:d4:30:4b:
b4:2f:59:3f:09:21:10:35:4d:78:be:42:a4:ea:e6:fd:
12:9a:8b:2f:27:7f:ac:78:fa:86:5e:85:81:6b:1f:70:
7c:97:e3:fb:df:c0:20:f7:c1:c8:06:bb:22:35:7b:06
Fingerprint (MD5):
3E:B3:8E:F1:98:F4:12:51:4D:2A:CF:9C:B7:83:C3:B9
Fingerprint (SHA1):
32:50:0D:DA:2D:CB:9D:B1:58:B0:D0:AA:89:07:C6:3F:CC:7C:1D:6C
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #457: CRL Distribution Points Extension (8) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
0
1
2
10
n
Generating key. This may take a few moments...
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt9
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:59:34
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Tue Nov 27 23:55:42 2012
Not After : Wed Feb 27 23:55:42 2013
Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d7:12:a4:f1:b9:60:e5:3b:2f:14:66:e3:37:df:10:22:
f6:88:e5:cd:29:8c:98:5e:4c:38:31:08:9b:8b:08:ba:
33:95:4d:b5:88:53:1d:a5:c0:c8:ab:41:1d:ad:20:db:
97:43:ca:09:ab:d1:8d:77:88:5c:db:04:67:90:c5:41:
d5:a2:f7:d1:01:d9:ef:f7:25:30:06:85:7d:41:a5:73:
eb:00:1a:40:11:2f:d3:2d:15:1a:ea:bd:ee:0d:fa:e6:
4d:58:89:b9:57:4d:55:94:eb:e2:09:66:27:5b:33:6b:
61:21:2e:18:cc:c8:02:98:3e:d9:8f:33:a4:09:59:11
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL Client,SSL Server,S/MIME>
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
6d:18:c1:84:ca:ba:24:f1:d7:5f:b6:f6:f3:2d:ba:4c:
19:3b:18:17:50:2b:62:cc:01:c2:81:e1:1c:4a:7d:6f:
94:e8:5f:ca:a4:0f:6b:dc:62:10:45:5e:58:2a:84:95:
07:8e:a6:d7:dd:8d:19:e4:67:ae:82:bd:b3:9b:42:00:
57:29:fc:8d:6a:16:9c:d4:12:a8:90:2e:de:f0:b0:72:
00:87:c7:8a:6e:a3:c5:33:27:e8:d0:d2:d7:83:05:5e:
d0:cc:50:ae:7f:b9:ec:04:85:91:f3:85:0c:59:4b:b6:
93:94:c5:43:54:e8:df:b4:35:8b:46:ea:e5:37:32:bd
Fingerprint (MD5):
AF:C5:6F:B0:D1:25:22:50:E0:63:2D:53:D5:36:27:C1
Fingerprint (SHA1):
32:A5:E4:49:A7:CE:3C:6F:98:1F:0F:CE:A9:BD:40:32:E3:CD:25:AF
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #458: Certificate Type Extension (9) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y
Generating key. This may take a few moments...
0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
> Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt10
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:59:35
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi
ew,ST=California,C=US"
Validity:
Not Before: Tue Nov 27 23:55:43 2012
Not After : Wed Feb 27 23:55:43 2013
Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V
iew,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
cb:60:b4:d2:7a:f1:45:6e:db:1e:37:b8:ae:88:47:28:
1f:9a:a5:53:8b:e0:d6:a4:f6:2c:d6:54:2e:05:d9:a2:
19:29:0c:a8:44:16:85:98:43:0e:1f:a4:19:67:1b:19:
6f:de:72:46:1d:6c:89:bf:04:5f:bc:ea:d4:cc:50:6a:
fd:b3:b5:37:d9:11:81:72:19:f7:69:85:cc:66:f7:8e:
59:9c:c9:d5:99:f5:b2:c2:dc:08:14:f0:cf:d1:db:ad:
1b:30:56:5c:40:13:86:8f:fd:f5:dc:67:46:0a:d3:cc:
f3:be:6b:f1:b1:a6:a9:d1:e2:a9:af:3b:65:b5:28:b9
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Extended Key Usage
Critical: True
TLS Web Server Authentication Certificate
TLS Web Client Authentication Certificate
Code Signing Certificate
E-Mail Protection Certificate
Time Stamping Certifcate
OCSP Responder Certificate
Strong Crypto Export Approved
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
8c:3b:7d:48:49:a4:7a:88:90:d7:a0:c5:27:91:b9:ee:
91:be:4b:0b:da:96:0a:cd:20:b3:cc:fe:79:85:d7:af:
77:68:8c:93:81:a5:2f:37:d1:20:50:d7:72:79:f5:05:
1e:64:35:d2:27:b7:ab:8d:5d:91:43:c2:6a:5e:c5:ac:
36:92:54:f8:3d:a5:fe:87:e6:55:8d:0e:7d:42:88:ab:
62:99:6b:94:70:53:40:58:b8:47:10:9c:dd:78:c3:96:
bc:7d:ec:ae:09:b7:5b:c0:7d:fe:ce:54:ce:18:56:b4:
8b:c9:10:6d:ee:03:de:1c:a3:56:3e:78:8e:3b:0b:02
Fingerprint (MD5):
82:A1:AD:CC:F9:31:F7:8B:AB:B3:20:7C:2D:D8:DC:08
Fingerprint (SHA1):
6A:7F:55:6C:53:80:98:15:F6:8A:95:53:2F:5A:5B:16:77:1C:28:B4
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #459: Extended Key Usage Extension (10) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
1
2
3
4
5
6
10
n
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt11
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:59:36
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi
ew,ST=California,C=US"
Validity:
Not Before: Tue Nov 27 23:55:43 2012
Not After : Wed Feb 27 23:55:43 2013
Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V
iew,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
af:5d:ec:6b:b3:97:b4:03:d3:c1:a1:57:f5:b8:b8:42:
06:4b:62:bf:d6:ae:cb:13:10:bd:47:e8:a3:bc:0c:42:
81:15:24:17:f7:5f:39:a8:c7:97:4e:67:7c:df:ac:ab:
85:92:c9:c6:5a:de:91:3d:54:4c:e5:11:28:0c:28:70:
a3:20:39:ca:f3:d9:a7:72:d8:32:79:6e:13:fb:46:0e:
3a:a1:6c:d7:21:c1:99:ed:ce:cd:80:bd:43:ef:f1:4c:
52:56:be:cf:9e:c9:c9:1a:b2:b2:6f:4b:b1:24:12:b8:
b8:f5:49:f3:e3:bc:7f:77:cf:d1:45:e0:d1:65:13:33
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Key Usage
Usages: Non-Repudiation
Key Encipherment
Data Encipherment
Key Agreement
Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:a9:c8:96:1f:72:71:46:40:f1:bd:11:7b:d3:a2:32:
56:33:f3:50:d8:12:af:c7:1c:67:01:5f:4f:aa:3b:10:
b5:97:4b:a6:8d:59:37:a2:aa:c5:6b:4a:84:04:e5:32:
44:eb:71:ad:f2:0d:9a:0a:7a:53:04:86:67:9f:d6:05:
e6:e0:56:24:d2:96:a6:b6:0b:93:66:a5:6f:95:70:8e:
b7:4e:70:b9:5a:29:e5:df:dd:d4:a1:90:eb:45:1e:12:
00:89:41:45:3d:c1:de:8a:20:da:6d:29:a2:45:ee:54:
a9:b0:22:54:7b:c7:fc:0d:36:22:9a:e2:b3:b0:7f:4e
Fingerprint (MD5):
4A:3C:9B:6D:2D:6C:38:F7:67:1E:AD:A6:A9:AA:75:03
Fingerprint (SHA1):
83:A4:DA:38:5D:BB:6D:EA:D3:EC:09:9D:75:F4:20:7B:B9:2B:FA:A0
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #460: Certificate Key Usage Extension (11) - PASSED
cert.sh: Create A Password Test Cert ==============
cert.sh: Create A Password Test Ca --------
cert.sh: Creating a CA Certificate PasswordCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dbpass
cert.sh: Creating CA Cert DB --------------------------
certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dbpass -f ../tests.pw
cert.sh: #461: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dbpass
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #462: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert PasswordCA --------------------------
certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #463: Creating CA Cert PasswordCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n PasswordCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dbpass -o root.cert
cert.sh: #464: Exporting Root Cert - PASSED
cert.sh: Changing password on Password Test Cert's Cert DB --------------------------
certutil -W -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dbpass -f ../tests.pw -@ ../tests.fipspw
Password changed successfully.
cert.sh: #465: Changing password on Password Test Cert's Cert DB - PASSED
cert.sh: Generate Certificate for Password Test Cert with new password --------------------------
certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dbpass -f ../tests.fipspw -z ../tests_noise
Generating key. This may take a few moments...
cert.sh: #466: Generate Certificate for Password Test Cert with new password - PASSED
cert.sh SUCCESS: PASSWORD passed
cert.sh: Verify Certificate for Password Test Cert with new password --------------------------
certutil -V -n PasswordCert -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dbpass -f ../tests.fipspw
certutil: certificate is valid
cert.sh: #467: Verify Certificate for Password Test Cert with new password - PASSED
cert.sh: Creating Distrusted Certificate
cert.sh: Initializing Distrusted's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
cert.sh: #468: Initializing Distrusted's Cert DB - PASSED
cert.sh: Loading root cert module to Distrusted's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #469: Loading root cert module to Distrusted's Cert DB - PASSED
cert.sh: Import Root CA for Distrusted --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -i ../CA/TestCA.ca.cert
cert.sh: #470: Import Root CA for Distrusted - PASSED
cert.sh: Import EC Root CA for Distrusted --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -i ../CA/TestCA-ec.ca.cert
cert.sh: #471: Import EC Root CA for Distrusted - PASSED
cert.sh: Generate Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #472: Generate Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's Request --------------------------
certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw
cert.sh: #473: Sign Distrusted's Request - PASSED
cert.sh: Import Distrusted's Cert --------------------------
certutil -A -n Distrusted -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -i Distrusted.cert
cert.sh: #474: Import Distrusted's Cert - PASSED
cert.sh SUCCESS: Distrusted's Cert Created
cert.sh: Generate EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #475: Generate EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request --------------------------
certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw
cert.sh: #476: Sign Distrusted's EC Request - PASSED
cert.sh: Import Distrusted's EC Cert --------------------------
certutil -A -n Distrusted-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -i Distrusted-ec.cert
cert.sh: #477: Import Distrusted's EC Cert - PASSED
cert.sh SUCCESS: Distrusted's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #478: Generate mixed EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request with RSA --------------------------
certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw
cert.sh: #479: Sign Distrusted's EC Request with RSA - PASSED
cert.sh: Import Distrusted's mixed EC Cert --------------------------
certutil -A -n Distrusted-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert
cert.sh: #480: Import Distrusted's mixed EC Cert - PASSED
cert.sh SUCCESS: Distrusted's mixed EC Cert Created
cert.sh: Mark CERT as unstrusted --------------------------
certutil -M -n Distrusted -t p,p,p -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
cert.sh: #481: Mark CERT as unstrusted - PASSED
cert.sh: Creating Distrusted Intermediate
cert.sh: Creating a CA Certificate DistrustedCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA
cert.sh: Creating CA Cert DistrustedCA --------------------------
certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #482: Creating CA Cert DistrustedCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n DistrustedCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -o root.cert
cert.sh: #483: Exporting Root Cert - PASSED
cert.sh: Import Distrusted Intermediate --------------------------
certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -i ../CA/DistrustedCA.ca.cert
cert.sh: #484: Import Distrusted Intermediate - PASSED
cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA --------------------------
certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #485: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED
cp: `./req' and `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA/req' are the same file
cert.sh: Sign LeafChainedToDistrustedCA's Request --------------------------
certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw
cert.sh: #486: Sign LeafChainedToDistrustedCA's Request - PASSED
cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u --------------------------
certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert
cert.sh: #487: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server --------------------------
certutil -V -n LeafChainedToDistrustedCA -u V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #488: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client --------------------------
certutil -V -n LeafChainedToDistrustedCA -u C -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #489: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #490: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient --------------------------
certutil -V -n LeafChainedToDistrustedCA -u R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #491: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder --------------------------
certutil -V -n LeafChainedToDistrustedCA -u O -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #492: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u J -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #493: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED
cert.sh: Verify Distrusted Cert for SSL Server --------------------------
certutil -V -n Distrusted -u V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #494: Verify Distrusted Cert for SSL Server - PASSED
cert.sh: Verify Distrusted Cert for SSL Client --------------------------
certutil -V -n Distrusted -u C -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #495: Verify Distrusted Cert for SSL Client - PASSED
cert.sh: Verify Distrusted Cert for Email signer --------------------------
certutil -V -n Distrusted -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #496: Verify Distrusted Cert for Email signer - PASSED
cert.sh: Verify Distrusted Cert for Email recipient --------------------------
certutil -V -n Distrusted -u R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #497: Verify Distrusted Cert for Email recipient - PASSED
cert.sh: Verify Distrusted Cert for OCSP responder --------------------------
certutil -V -n Distrusted -u O -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #498: Verify Distrusted Cert for OCSP responder - PASSED
cert.sh: Verify Distrusted Cert for Object Signer --------------------------
certutil -V -n Distrusted -u J -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #499: Verify Distrusted Cert for Object Signer - PASSED
cert.sh: OCSP response creation selftest
cert.sh: perform selftest --------------------------
ocspresp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA serverCA chain-1-serverCA -f ../tests.pw
cert.sh: #500: perform selftest - PASSED
cert.sh: Creating Client CA Issued Certificates Range 40 - 52 ===
cert.sh: Generate Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #501: Generate Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw
cert.sh: #502: Sign TestUser40's Request - PASSED
cert.sh: Import TestUser40's Cert --------------------------
certutil -A -n TestUser40 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser40.cert
cert.sh: #503: Import TestUser40's Cert - PASSED
cert.sh SUCCESS: TestUser40's Cert Created
cert.sh: Generate EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #504: Generate EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw
cert.sh: #505: Sign TestUser40's EC Request - PASSED
cert.sh: Import TestUser40's EC Cert --------------------------
certutil -A -n TestUser40-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser40-ec.cert
cert.sh: #506: Import TestUser40's EC Cert - PASSED
cert.sh SUCCESS: TestUser40's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #507: Generate mixed EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw
cert.sh: #508: Sign TestUser40's EC Request with RSA - PASSED
cert.sh: Import TestUser40's mixed EC Cert --------------------------
certutil -A -n TestUser40-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser40-ecmixed.cert
cert.sh: #509: Import TestUser40's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser40's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #510: Generate Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's Request --------------------------
certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw
cert.sh: #511: Sign TestUser41's Request - PASSED
cert.sh: Import TestUser41's Cert --------------------------
certutil -A -n TestUser41 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser41.cert
cert.sh: #512: Import TestUser41's Cert - PASSED
cert.sh SUCCESS: TestUser41's Cert Created
cert.sh: Generate EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #513: Generate EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request --------------------------
certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw
cert.sh: #514: Sign TestUser41's EC Request - PASSED
cert.sh: Import TestUser41's EC Cert --------------------------
certutil -A -n TestUser41-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser41-ec.cert
cert.sh: #515: Import TestUser41's EC Cert - PASSED
cert.sh SUCCESS: TestUser41's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #516: Generate mixed EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw
cert.sh: #517: Sign TestUser41's EC Request with RSA - PASSED
cert.sh: Import TestUser41's mixed EC Cert --------------------------
certutil -A -n TestUser41-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser41-ecmixed.cert
cert.sh: #518: Import TestUser41's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser41's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #519: Generate Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's Request --------------------------
certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw
cert.sh: #520: Sign TestUser42's Request - PASSED
cert.sh: Import TestUser42's Cert --------------------------
certutil -A -n TestUser42 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser42.cert
cert.sh: #521: Import TestUser42's Cert - PASSED
cert.sh SUCCESS: TestUser42's Cert Created
cert.sh: Generate EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #522: Generate EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request --------------------------
certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw
cert.sh: #523: Sign TestUser42's EC Request - PASSED
cert.sh: Import TestUser42's EC Cert --------------------------
certutil -A -n TestUser42-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser42-ec.cert
cert.sh: #524: Import TestUser42's EC Cert - PASSED
cert.sh SUCCESS: TestUser42's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #525: Generate mixed EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw
cert.sh: #526: Sign TestUser42's EC Request with RSA - PASSED
cert.sh: Import TestUser42's mixed EC Cert --------------------------
certutil -A -n TestUser42-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser42-ecmixed.cert
cert.sh: #527: Import TestUser42's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser42's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #528: Generate Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's Request --------------------------
certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw
cert.sh: #529: Sign TestUser43's Request - PASSED
cert.sh: Import TestUser43's Cert --------------------------
certutil -A -n TestUser43 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser43.cert
cert.sh: #530: Import TestUser43's Cert - PASSED
cert.sh SUCCESS: TestUser43's Cert Created
cert.sh: Generate EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #531: Generate EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request --------------------------
certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw
cert.sh: #532: Sign TestUser43's EC Request - PASSED
cert.sh: Import TestUser43's EC Cert --------------------------
certutil -A -n TestUser43-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser43-ec.cert
cert.sh: #533: Import TestUser43's EC Cert - PASSED
cert.sh SUCCESS: TestUser43's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #534: Generate mixed EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw
cert.sh: #535: Sign TestUser43's EC Request with RSA - PASSED
cert.sh: Import TestUser43's mixed EC Cert --------------------------
certutil -A -n TestUser43-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser43-ecmixed.cert
cert.sh: #536: Import TestUser43's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser43's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #537: Generate Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's Request --------------------------
certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw
cert.sh: #538: Sign TestUser44's Request - PASSED
cert.sh: Import TestUser44's Cert --------------------------
certutil -A -n TestUser44 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser44.cert
cert.sh: #539: Import TestUser44's Cert - PASSED
cert.sh SUCCESS: TestUser44's Cert Created
cert.sh: Generate EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #540: Generate EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request --------------------------
certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw
cert.sh: #541: Sign TestUser44's EC Request - PASSED
cert.sh: Import TestUser44's EC Cert --------------------------
certutil -A -n TestUser44-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser44-ec.cert
cert.sh: #542: Import TestUser44's EC Cert - PASSED
cert.sh SUCCESS: TestUser44's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #543: Generate mixed EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw
cert.sh: #544: Sign TestUser44's EC Request with RSA - PASSED
cert.sh: Import TestUser44's mixed EC Cert --------------------------
certutil -A -n TestUser44-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser44-ecmixed.cert
cert.sh: #545: Import TestUser44's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser44's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #546: Generate Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's Request --------------------------
certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw
cert.sh: #547: Sign TestUser45's Request - PASSED
cert.sh: Import TestUser45's Cert --------------------------
certutil -A -n TestUser45 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser45.cert
cert.sh: #548: Import TestUser45's Cert - PASSED
cert.sh SUCCESS: TestUser45's Cert Created
cert.sh: Generate EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #549: Generate EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request --------------------------
certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw
cert.sh: #550: Sign TestUser45's EC Request - PASSED
cert.sh: Import TestUser45's EC Cert --------------------------
certutil -A -n TestUser45-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser45-ec.cert
cert.sh: #551: Import TestUser45's EC Cert - PASSED
cert.sh SUCCESS: TestUser45's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #552: Generate mixed EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw
cert.sh: #553: Sign TestUser45's EC Request with RSA - PASSED
cert.sh: Import TestUser45's mixed EC Cert --------------------------
certutil -A -n TestUser45-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser45-ecmixed.cert
cert.sh: #554: Import TestUser45's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser45's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #555: Generate Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's Request --------------------------
certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw
cert.sh: #556: Sign TestUser46's Request - PASSED
cert.sh: Import TestUser46's Cert --------------------------
certutil -A -n TestUser46 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser46.cert
cert.sh: #557: Import TestUser46's Cert - PASSED
cert.sh SUCCESS: TestUser46's Cert Created
cert.sh: Generate EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #558: Generate EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request --------------------------
certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw
cert.sh: #559: Sign TestUser46's EC Request - PASSED
cert.sh: Import TestUser46's EC Cert --------------------------
certutil -A -n TestUser46-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser46-ec.cert
cert.sh: #560: Import TestUser46's EC Cert - PASSED
cert.sh SUCCESS: TestUser46's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #561: Generate mixed EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw
cert.sh: #562: Sign TestUser46's EC Request with RSA - PASSED
cert.sh: Import TestUser46's mixed EC Cert --------------------------
certutil -A -n TestUser46-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser46-ecmixed.cert
cert.sh: #563: Import TestUser46's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser46's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #564: Generate Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's Request --------------------------
certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw
cert.sh: #565: Sign TestUser47's Request - PASSED
cert.sh: Import TestUser47's Cert --------------------------
certutil -A -n TestUser47 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser47.cert
cert.sh: #566: Import TestUser47's Cert - PASSED
cert.sh SUCCESS: TestUser47's Cert Created
cert.sh: Generate EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #567: Generate EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request --------------------------
certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw
cert.sh: #568: Sign TestUser47's EC Request - PASSED
cert.sh: Import TestUser47's EC Cert --------------------------
certutil -A -n TestUser47-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser47-ec.cert
cert.sh: #569: Import TestUser47's EC Cert - PASSED
cert.sh SUCCESS: TestUser47's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #570: Generate mixed EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw
cert.sh: #571: Sign TestUser47's EC Request with RSA - PASSED
cert.sh: Import TestUser47's mixed EC Cert --------------------------
certutil -A -n TestUser47-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser47-ecmixed.cert
cert.sh: #572: Import TestUser47's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser47's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #573: Generate Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's Request --------------------------
certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw
cert.sh: #574: Sign TestUser48's Request - PASSED
cert.sh: Import TestUser48's Cert --------------------------
certutil -A -n TestUser48 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser48.cert
cert.sh: #575: Import TestUser48's Cert - PASSED
cert.sh SUCCESS: TestUser48's Cert Created
cert.sh: Generate EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #576: Generate EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request --------------------------
certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw
cert.sh: #577: Sign TestUser48's EC Request - PASSED
cert.sh: Import TestUser48's EC Cert --------------------------
certutil -A -n TestUser48-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser48-ec.cert
cert.sh: #578: Import TestUser48's EC Cert - PASSED
cert.sh SUCCESS: TestUser48's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #579: Generate mixed EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw
cert.sh: #580: Sign TestUser48's EC Request with RSA - PASSED
cert.sh: Import TestUser48's mixed EC Cert --------------------------
certutil -A -n TestUser48-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser48-ecmixed.cert
cert.sh: #581: Import TestUser48's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser48's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #582: Generate Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's Request --------------------------
certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw
cert.sh: #583: Sign TestUser49's Request - PASSED
cert.sh: Import TestUser49's Cert --------------------------
certutil -A -n TestUser49 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser49.cert
cert.sh: #584: Import TestUser49's Cert - PASSED
cert.sh SUCCESS: TestUser49's Cert Created
cert.sh: Generate EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #585: Generate EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request --------------------------
certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw
cert.sh: #586: Sign TestUser49's EC Request - PASSED
cert.sh: Import TestUser49's EC Cert --------------------------
certutil -A -n TestUser49-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser49-ec.cert
cert.sh: #587: Import TestUser49's EC Cert - PASSED
cert.sh SUCCESS: TestUser49's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #588: Generate mixed EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw
cert.sh: #589: Sign TestUser49's EC Request with RSA - PASSED
cert.sh: Import TestUser49's mixed EC Cert --------------------------
certutil -A -n TestUser49-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser49-ecmixed.cert
cert.sh: #590: Import TestUser49's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser49's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #591: Generate Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw
cert.sh: #592: Sign TestUser50's Request - PASSED
cert.sh: Import TestUser50's Cert --------------------------
certutil -A -n TestUser50 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser50.cert
cert.sh: #593: Import TestUser50's Cert - PASSED
cert.sh SUCCESS: TestUser50's Cert Created
cert.sh: Generate EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #594: Generate EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw
cert.sh: #595: Sign TestUser50's EC Request - PASSED
cert.sh: Import TestUser50's EC Cert --------------------------
certutil -A -n TestUser50-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser50-ec.cert
cert.sh: #596: Import TestUser50's EC Cert - PASSED
cert.sh SUCCESS: TestUser50's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #597: Generate mixed EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw
cert.sh: #598: Sign TestUser50's EC Request with RSA - PASSED
cert.sh: Import TestUser50's mixed EC Cert --------------------------
certutil -A -n TestUser50-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser50-ecmixed.cert
cert.sh: #599: Import TestUser50's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser50's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #600: Generate Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's Request --------------------------
certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw
cert.sh: #601: Sign TestUser51's Request - PASSED
cert.sh: Import TestUser51's Cert --------------------------
certutil -A -n TestUser51 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser51.cert
cert.sh: #602: Import TestUser51's Cert - PASSED
cert.sh SUCCESS: TestUser51's Cert Created
cert.sh: Generate EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #603: Generate EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request --------------------------
certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw
cert.sh: #604: Sign TestUser51's EC Request - PASSED
cert.sh: Import TestUser51's EC Cert --------------------------
certutil -A -n TestUser51-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser51-ec.cert
cert.sh: #605: Import TestUser51's EC Cert - PASSED
cert.sh SUCCESS: TestUser51's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #606: Generate mixed EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw
cert.sh: #607: Sign TestUser51's EC Request with RSA - PASSED
cert.sh: Import TestUser51's mixed EC Cert --------------------------
certutil -A -n TestUser51-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser51-ecmixed.cert
cert.sh: #608: Import TestUser51's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser51's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #609: Generate Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's Request --------------------------
certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw
cert.sh: #610: Sign TestUser52's Request - PASSED
cert.sh: Import TestUser52's Cert --------------------------
certutil -A -n TestUser52 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser52.cert
cert.sh: #611: Import TestUser52's Cert - PASSED
cert.sh SUCCESS: TestUser52's Cert Created
cert.sh: Generate EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #612: Generate EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request --------------------------
certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw
cert.sh: #613: Sign TestUser52's EC Request - PASSED
cert.sh: Import TestUser52's EC Cert --------------------------
certutil -A -n TestUser52-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser52-ec.cert
cert.sh: #614: Import TestUser52's EC Cert - PASSED
cert.sh SUCCESS: TestUser52's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #615: Generate mixed EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw
cert.sh: #616: Sign TestUser52's EC Request with RSA - PASSED
cert.sh: Import TestUser52's mixed EC Cert --------------------------
certutil -A -n TestUser52-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser52-ecmixed.cert
cert.sh: #617: Import TestUser52's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser52's mixed EC Cert Created
cert.sh: Creating CA CRL =====================================
cert.sh: Generating CRL for range 40-42 TestCA authority --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or
cert.sh: #618: Generating CRL for range 40-42 TestCA authority - PASSED
cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority --------------------------
crlutil -q -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec
cert.sh: #619: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED
cert.sh: Modifying CA CRL by adding one more cert ============
cert.sh: Modify CRL by adding one more cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or
cert.sh: #620: Modify CRL by adding one more cert - PASSED
cert.sh: Modify CRL (ECC) by adding one more cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec
cert.sh: #621: Modify CRL (ECC) by adding one more cert - PASSED
cert.sh: Modifying CA CRL by removing one cert ===============
cert.sh: Modify CRL by removing one cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #622: Modify CRL by removing one cert - PASSED
cert.sh: Modify CRL (ECC) by removing one cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec
cert.sh: #623: Modify CRL (ECC) by removing one cert - PASSED
cert.sh: Creating CA CRL for groups 1 and 2 ===============
cert.sh: Creating CRL for groups 1 and 2 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42
cert.sh: #624: Creating CRL for groups 1 and 2 - PASSED
cert.sh: Creating CRL (ECC) for groups 1 and 2 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec
cert.sh: #625: Creating CRL (ECC) for groups 1 and 2 - PASSED
cert.sh: Creating CA CRL for groups 1, 2 and 3 ===============
cert.sh: Creating CRL for groups 1, 2 and 3 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48
cert.sh: #626: Creating CRL for groups 1, 2 and 3 - PASSED
cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec
cert.sh: #627: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED
cert.sh: Importing Server CA Issued CRL for certs trough 52
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -D -n TestCA -f ../tests.pw -d ../server
crlutil: could not find TestCA's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA's CRL: No matching CRL was found.
cert.sh: #628: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server
cert.sh: #629: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server
crlutil: could not find TestCA-ec's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA-ec's CRL: No matching CRL was found.
cert.sh: #630: Importing CRL (ECC) for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server
cert.sh: #631: Importing CRL (ECC) for groups 1 - PASSED
cert.sh SUCCESS: SSL CRL prep passed
cert.sh cert.sh: finished cert.sh
TIMESTAMP cert END: Tue Nov 27 18:56:03 EST 2012
Running tests for dbtests
TIMESTAMP dbtests BEGIN: Tue Nov 27 18:56:03 EST 2012
dbtests.sh: CERT and Key DB Tests ===============================
---------------------------------------------------------------
| test opening the database read/write in a nonexisting directory
---------------------------------------------------------------
certutil: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #632: Certutil didn't work in a nonexisting dir 255 - PASSED
dbdir selected is ./non_existent_dir
ERROR: Directory "./non_existent_dir" does not exist.
dbtest: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #633: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED
---------------------------------------------------------------
| test force opening the database in a nonexisting directory
---------------------------------------------------------------
dbdir selected is ./non_existent_dir
ERROR: Directory "./non_existent_dir" does not exist.
dbtests.sh: #634: Dbtest force succeeded in a nonexisting dir 0 - PASSED
---------------------------------------------------------------
| test opening the database readonly in an empty directory
---------------------------------------------------------------
tstclnt: unable to open cert database: The certificate/key database is in an old, unsupported format.
dbtests.sh: #635: Tstclnt didn't work in an empty dir 1 - PASSED
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/secmod.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/cert8.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/key3.db" does not exist.
dbtest: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #636: Dbtest readonly didn't work in an empty dir 46 - PASSED
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir
dbtests.sh: #637: Dbtest logout after empty DB Init has key - PASSED
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir
dbtests.sh: #638: Dbtest password DB Init maintains needlogin state - PASSED
certutil: could not find certificate named "xxxx": security library: bad database.
dbtests.sh: #639: Certutil didn't work in an empty dir 255 - PASSED
---------------------------------------------------------------
| test force opening the database readonly in a empty directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/secmod.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/cert8.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/key3.db" does not exist.
dbtests.sh: #640: Dbtest force readonly succeeded in an empty dir 0 - PASSED
---------------------------------------------------------------
| test opening the database r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir
ERROR: Directory "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db" is not writeable.
dbtest: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #641: Dbtest r/w didn't work in an readonly dir 46 - PASSED
certutil: could not find certificate named "TestUser": security library: bad database.
dbtests.sh: #642: Certutil didn't work in an readonly dir 255 - PASSED
---------------------------------------------------------------
| test opening the database ronly in a readonly directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db
dbtests.sh: #643: Dbtest readonly succeeded in a readonly dir 0 - PASSED
---------------------------------------------------------------
| test force opening the database r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir
ERROR: Directory "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db" is not writeable.
dbtests.sh: #644: Dbtest force succeeded in a readonly dir 0 - PASSED
---------------------------------------------------------------
| ls -l /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir
---------------------------------------------------------------
dr-xr-xr-x. 2 tinderbox tinderbox 4096 Nov 27 18:56 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir
-r--------. 1 tinderbox tinderbox 131072 Nov 27 18:56 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db
-r--------. 1 tinderbox tinderbox 53248 Nov 27 18:56 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db
-r--r-----. 1 tinderbox tinderbox 393 Nov 27 18:56 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/req
-r--------. 1 tinderbox tinderbox 16384 Nov 27 18:56 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db
-r--r-----. 1 tinderbox tinderbox 609 Nov 27 18:56 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/TestUser.cert
-r--r-----. 1 tinderbox tinderbox 579 Nov 27 18:56 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/TestUser-ec.cert
-r--r-----. 1 tinderbox tinderbox 576 Nov 27 18:56 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/TestUser-ecmixed.cert
---------------------------------------------------------------
| test creating a new cert with a conflicting nickname
---------------------------------------------------------------
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/conflictdir
certutil: could not add certificate to token or database: Error adding certificate to database.
dbtests.sh: #645: Nicknane conflict test, could not import conflict nickname 255 - PASSED
---------------------------------------------------------------
| test importing an old cert to a conflicting nickname
---------------------------------------------------------------
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 40 (0x28)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:23 2012
Not After : Mon Nov 27 23:55:23 2017
Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif
ornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
c4:c5:6f:d0:8c:bd:53:97:b4:7d:33:02:5f:f8:51:9b:
7b:1b:6e:67:fd:a3:fb:8c:9d:0f:fb:cf:6d:06:ed:76:
f2:d1:06:d5:b7:73:f5:81:60:4d:78:94:61:6c:07:52:
61:3b:52:0c:c1:ca:5b:3d:a2:2e:70:40:0e:2e:8a:16:
7d:96:5f:c7:4b:b5:ad:ea:14:02:fa:1c:3f:a9:95:c0:
8f:bd:d5:06:cb:c9:1c:2a:37:66:df:a3:43:7e:fc:d1:
ac:16:90:5a:03:06:d8:2e:4e:5c:53:cf:9e:37:7f:da:
ad:2b:12:54:75:21:4a:b3:70:db:89:52:3c:c9:0b:07
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
85:c2:42:40:f0:1d:e6:3e:80:5a:cd:33:38:56:80:e4:
c1:d2:8d:95:07:42:27:30:99:03:7e:6d:56:4e:88:15:
1f:a3:d2:5d:1d:87:e1:c1:73:5a:f0:65:53:47:1b:12:
ae:16:6f:36:e1:f1:63:f1:45:51:45:c3:a4:d5:d4:e5:
bc:0f:c3:3d:64:c2:28:3b:2b:ad:c1:a0:c0:ca:03:9e:
c5:f6:53:79:e5:4b:b7:7f:cb:aa:11:c0:d8:56:52:4c:
21:a6:0d:14:74:96:14:e9:17:4f:74:51:5b:e9:85:c7:
43:9d:8c:27:79:bd:8f:07:54:5f:f4:2f:dd:b8:9f:b1
Fingerprint (MD5):
66:EC:C5:E3:29:58:24:E9:8C:9D:18:99:8D:CE:C0:BB
Fingerprint (SHA1):
11:BC:BB:A6:E1:69:5D:0A:7F:65:D4:D6:B1:3A:9A:B2:F1:A2:B6:2F
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
dbtests.sh: #646: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED
TIMESTAMP dbtests END: Tue Nov 27 18:56:04 EST 2012
Running tests for tools
TIMESTAMP tools BEGIN: Tue Nov 27 18:56:04 EST 2012
tools.sh: Tools Tests with ECC ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #647: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
cf:05:d1:4c:05:90:02:51:ec:1c:19:f0:33:cc:07:51
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #648: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #649: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's email EC cert & key---------------
pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \
-w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #650: Exporting Alice's email EC cert & key (pk12util -o) - PASSED
tools.sh: Importing Alice's email EC cert & key --------------
pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #651: Importing Alice's email EC cert & key (pk12util -i) - PASSED
tools.sh: Listing Alice's pk12 EC file -----------------
pk12util -l Alice-ec.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice-ec
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
c9:86:08:3c:5b:5f:1f:d6:74:e2:91:c4:24:f8:b0:8b
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: X9.62 ECDSA signature with SHA-1
Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
ia,C=US"
Validity:
Not Before: Tue Nov 27 23:55:16 2012
Not After : Mon Nov 27 23:55:16 2062
Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor
nia,C=US"
Subject Public Key Info:
Public Key Algorithm: X9.62 elliptic curve public key
Args:
06:05:2b:81:04:00:23
EC Public Key:
PublicValue:
04:00:f1:79:3b:f2:d4:94:70:40:9f:e0:c4:59:f6:16:
8e:f8:c1:df:08:80:9d:af:6c:6b:f3:8e:72:f6:87:10:
a4:7a:f3:e5:47:17:a4:c4:ac:98:8f:51:49:ea:77:05:
59:df:1e:b6:d8:d4:00:d7:1a:64:c0:13:11:57:3e:68:
73:24:f6:00:01:8c:f4:52:40:8a:21:1d:f5:7d:5b:45:
26:da:36:39:bb:0f:e2:b0:7c:cc:b9:30:91:eb:66:f2:
58:fe:67:f6:62:85:b4:a1:9f:65:c3:60:ae:66:40:89:
32:2d:00:92:f9:35:72:d6:1b:18:98:e7:a6:e1:db:91:
75:1f:de:e8:cb
Curve: SECG elliptic curve secp521r1 (aka NIST P-521)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: X9.62 ECDSA signature with SHA-1
Signature:
30:81:88:02:42:01:ae:63:26:63:67:60:3a:06:f3:1c:
1a:ff:18:3f:a7:91:cc:96:37:b0:ce:78:c5:64:cf:90:
f5:9f:2c:42:ad:83:a7:cb:42:68:95:1e:dc:b9:68:35:
aa:7d:0d:b5:4e:8d:96:8e:ca:d9:e2:0a:d9:a9:63:9b:
ea:23:9b:75:e1:4f:1f:02:42:01:e7:55:92:d1:b4:06:
60:97:28:0f:87:af:9e:46:b9:a0:bb:54:91:5c:73:4c:
0f:f9:bf:fb:72:ba:f5:c7:00:33:9a:87:7b:60:ac:c9:
86:0f:45:34:9f:3e:9f:e6:4a:a9:e0:89:b2:51:de:d6:
5c:54:ef:64:91:ff:02:4d:0f:87:80
Fingerprint (MD5):
9B:36:FA:C2:0E:1F:26:76:CD:34:8F:F3:3C:47:4C:97
Fingerprint (SHA1):
E8:77:A2:4F:CA:86:26:80:B3:14:5E:AF:A4:A0:35:BB:5D:16:27:82
Friendly Name: TestCA-ec
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: X9.62 ECDSA signature with SHA-1
Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
ia,C=US"
Validity:
Not Before: Tue Nov 27 23:55:23 2012
Not After : Mon Nov 27 23:55:23 2017
Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S
T=California,C=US"
Subject Public Key Info:
Public Key Algorithm: X9.62 elliptic curve public key
Args:
06:05:2b:81:04:00:22
EC Public Key:
PublicValue:
04:d9:55:dc:f4:97:1c:63:c6:b2:97:bd:68:71:e5:15:
fb:59:88:71:68:18:4b:b9:cf:41:1c:89:d8:88:9d:1e:
c6:45:a5:8d:ec:84:cb:e6:ac:40:e6:00:24:09:0b:c1:
2a:e5:cb:d4:e9:0a:1c:0c:c0:c4:0b:3d:ad:ce:5a:e2:
24:d2:bc:f3:90:90:8e:f4:a7:b5:32:58:21:4f:ce:00:
f3:7e:60:58:5b:6a:7f:5a:ce:13:4d:da:89:aa:b0:47:
9f
Curve: SECG elliptic curve secp384r1 (aka NIST P-384)
Signature Algorithm: X9.62 ECDSA signature with SHA-1
Signature:
30:81:88:02:42:01:24:87:61:4d:3a:be:2d:5e:e6:f7:
ec:5a:16:63:61:10:df:f4:93:86:cb:7f:49:2b:bf:62:
45:85:d0:52:26:ef:14:73:c4:a7:ec:e5:82:20:92:bf:
9d:17:20:05:c8:92:f7:39:f6:4b:07:6e:20:89:f3:db:
ae:31:a4:d4:ef:ea:c4:02:42:01:ad:12:ff:38:fb:e6:
06:42:cb:b0:e9:bd:a7:73:c6:e5:7b:72:4d:20:54:a5:
e4:35:fb:98:ab:e3:82:2f:f3:58:93:26:22:a9:59:21:
49:c1:08:8e:f1:b2:7d:00:22:98:70:29:2d:3f:1a:06:
12:7e:59:a2:a3:6c:62:ae:95:68:8b
Fingerprint (MD5):
8F:FF:40:B3:FD:46:09:F3:11:D6:88:CF:35:7F:6C:C9
Fingerprint (SHA1):
C7:57:97:77:7F:32:F7:88:8C:5C:4B:85:C4:76:D4:E4:F1:C3:74:33
Friendly Name: Alice-ec
tools.sh: #652: Listing Alice's pk12 EC file (pk12util -l) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #653: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
Parameters:
Salt:
a8:51:cc:4e:6b:7d:5c:c3:c9:89:86:ce:64:9f:be:92
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #654: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #655: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #656: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
Parameters:
Salt:
0c:27:76:1c:fb:da:b1:c5:f2:72:e4:92:c1:e6:49:69
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #657: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #658: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #659: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
Parameters:
Salt:
9c:dc:21:04:30:ac:26:4c:a9:96:92:24:4e:ee:46:95
Iteration Count: 2000 (0x7d0)
tools.sh: #660: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #661: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #662: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
ce:9b:2c:68:6e:26:90:31:2f:85:18:37:08:00:a6:8c
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #663: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #664: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #665: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
45:8f:52:ff:c8:9d:eb:d7:10:07:d8:2b:08:41:f2:b3
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #666: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #667: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #668: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
e6:01:63:94:1e:64:62:4c:7a:42:88:38:42:a1:20:3e
Iteration Count: 2000 (0x7d0)
tools.sh: #669: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #670: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #671: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
7c:51:99:7b:b2:19:76:82:17:0c:2d:71:88:34:c0:d7
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-128-CBC
Args:
04:10:3a:dc:90:79:34:77:22:37:fb:54:f5:94:46:4e:
e1:de
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #672: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #673: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #674: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
20:be:32:14:a3:69:66:72:83:e9:cf:45:87:09:a2:f6
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-128-CBC
Args:
04:10:8a:09:9b:fc:58:02:8f:f9:58:b2:6b:73:d6:9f:
26:3d
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #675: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #676: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #677: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
ce:76:f2:c6:bd:4c:fa:b9:21:3b:2c:4f:4b:f1:bc:22
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-128-CBC
Args:
04:10:5a:45:09:57:7e:8b:e3:ba:6a:15:1a:7c:cb:ac:
e8:1d
tools.sh: #678: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #679: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #680: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
77:ad:b9:5f:c9:3a:c0:95:7a:6f:41:87:b4:df:69:2d
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-192-CBC
Args:
04:10:31:df:03:6a:8b:c6:3d:62:78:ac:db:56:f8:8b:
cd:b3
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #681: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #682: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #683: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
bd:22:17:40:40:f4:6c:81:aa:98:ff:8a:c1:91:6c:cf
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-192-CBC
Args:
04:10:75:49:7c:ec:bc:84:e1:1c:d2:d6:00:8e:ef:72:
64:54
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #684: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #685: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #686: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
0f:5f:fc:94:c3:87:40:05:1c:49:cf:5f:d7:9e:05:b4
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-192-CBC
Args:
04:10:eb:53:c8:7e:d4:b9:7d:86:b5:cf:e2:f2:e8:17:
4e:cc
tools.sh: #687: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #688: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #689: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
d9:9b:ba:b9:b8:08:07:c3:9c:21:18:f9:39:6d:ff:e2
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-256-CBC
Args:
04:10:aa:53:c1:36:62:34:fc:1c:bc:3b:fa:dc:47:c1:
cf:ac
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #690: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #691: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #692: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
53:d8:45:c5:db:e4:06:31:d2:83:3b:ed:e0:1e:36:56
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-256-CBC
Args:
04:10:fd:f4:44:f5:6c:d2:58:da:0c:b2:6e:76:99:0b:
9a:d8
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #693: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #694: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #695: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
b4:7d:fd:0e:9a:ea:d9:fb:80:c2:2b:37:83:5c:a7:4e
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-256-CBC
Args:
04:10:8e:67:ec:46:70:cd:90:d5:64:2c:8d:8d:90:47:
90:01
tools.sh: #696: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #697: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #698: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
3d:8c:6c:c2:31:cd:e5:1f:c4:80:d5:09:c3:4d:e8:a5
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-128-CBC
Args:
04:10:41:10:24:b7:62:af:72:7c:7a:2b:d2:01:9c:02:
38:3a
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #699: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #700: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #701: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
1c:32:20:fb:56:e4:4e:6d:b5:f1:94:50:8a:b8:76:3c
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-128-CBC
Args:
04:10:d5:20:d0:f5:af:e6:47:b3:2b:86:61:d2:cc:45:
34:a3
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #702: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #703: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #704: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
91:39:64:aa:13:75:87:5f:73:af:8f:e1:3c:d0:79:50
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-128-CBC
Args:
04:10:6e:c7:14:47:76:e6:6c:c8:5d:09:89:5c:e8:bf:
3d:d9
tools.sh: #705: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #706: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #707: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
e7:22:9b:1e:b9:33:a0:9d:61:e6:a3:5b:b3:5d:d5:f1
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-192-CBC
Args:
04:10:41:ca:22:e1:78:66:e0:a9:e6:da:ff:9a:df:57:
d9:4e
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #708: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #709: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #710: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
2b:da:55:54:20:f9:8b:af:9b:25:0a:53:c5:85:7f:d5
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-192-CBC
Args:
04:10:9d:63:81:60:8f:c2:5b:39:ac:04:e4:e0:90:04:
9a:50
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #711: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #712: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #713: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
d2:09:14:97:6b:96:a4:c0:79:ce:99:d8:62:5f:f2:fc
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-192-CBC
Args:
04:10:cd:f5:23:52:2e:bd:be:1b:4b:de:f1:6e:de:ae:
0f:f3
tools.sh: #714: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #715: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #716: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
f7:81:11:61:81:cd:ba:4f:74:71:57:b0:6c:aa:ad:32
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-256-CBC
Args:
04:10:20:b5:91:b7:d6:d6:c5:32:9c:13:67:ca:b6:86:
45:91
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #717: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #718: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #719: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
19:0e:b9:f9:f7:7d:12:f7:2a:14:74:e5:1d:1a:08:38
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-256-CBC
Args:
04:10:33:3b:b0:53:0c:87:0f:5c:ca:de:59:c1:a5:54:
5c:b6
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #720: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #721: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #722: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
e2:98:cf:58:07:71:92:17:80:96:70:ef:32:86:d6:cd
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-256-CBC
Args:
04:10:fe:b1:47:f8:3f:31:90:d0:bb:c5:96:4e:07:a0:
82:9f
tools.sh: #723: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #724: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #725: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
Parameters:
Salt:
df:56:17:da:e8:83:98:8f:b1:f8:33:dc:16:7d:f9:ee
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #726: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #727: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #728: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
Parameters:
Salt:
26:8c:6c:32:68:c4:59:94:7c:9e:b3:2b:6e:df:50:52
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #729: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #730: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #731: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
Parameters:
Salt:
0d:23:01:d0:f1:a1:02:81:06:5e:f7:7e:7b:bb:48:38
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #732: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #733: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #734: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
Parameters:
Salt:
db:15:04:27:2d:75:dd:61:c0:d6:f2:db:07:92:70:02
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #735: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #736: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #737: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
Parameters:
Salt:
56:cd:d4:32:7e:83:d3:4a:04:a0:f2:c6:91:d5:f2:de
Iteration Count: 2000 (0x7d0)
tools.sh: #738: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #739: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #740: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
Parameters:
Salt:
d8:f8:22:92:3a:75:52:0e:b8:30:d7:09:6d:51:94:15
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #741: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #742: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #743: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
Parameters:
Salt:
79:eb:b0:92:42:16:fb:22:85:bf:cf:7f:2f:1e:95:87
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #744: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #745: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #746: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
Parameters:
Salt:
63:f4:7e:05:10:c1:d9:ff:13:5e:ee:3d:cb:0f:62:68
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #747: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #748: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #749: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
Parameters:
Salt:
27:ce:94:ea:0e:d5:4b:1e:9f:be:42:7a:a6:ad:cc:a3
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #750: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #751: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #752: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
Parameters:
Salt:
79:28:f6:3e:a8:3f:88:4a:a7:dd:cd:02:d7:ca:5b:f1
Iteration Count: 2000 (0x7d0)
tools.sh: #753: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #754: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #755: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
Parameters:
Salt:
5b:f7:50:2b:50:51:62:6f:b6:63:14:c4:45:34:a0:4c
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #756: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #757: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #758: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
Parameters:
Salt:
0e:1c:58:15:30:ba:91:ad:c7:eb:e1:e2:0a:7c:c0:ca
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #759: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #760: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #761: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
Parameters:
Salt:
e1:df:a5:62:10:6b:2e:37:84:34:96:51:ef:aa:c9:27
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #762: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #763: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #764: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
Parameters:
Salt:
c0:af:4a:5a:16:ab:6d:d8:83:b6:10:d9:1a:14:c5:c6
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #765: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #766: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #767: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
Parameters:
Salt:
49:8f:c9:67:48:13:59:24:9d:33:2f:d6:62:67:89:28
Iteration Count: 2000 (0x7d0)
tools.sh: #768: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #769: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #770: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
67:6f:60:5e:4b:fa:0f:6b:e5:a6:35:fd:e4:6c:2c:3c
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #771: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #772: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #773: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
2e:fb:96:8c:ab:f0:a4:dd:70:8c:d5:15:14:aa:02:f7
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #774: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #775: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #776: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
9d:c1:de:64:33:f0:08:e3:c6:e1:7c:e0:37:22:11:ed
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #777: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #778: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #779: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
9c:dc:9a:f0:0b:b2:b5:df:f5:ba:d4:95:50:a4:16:50
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #780: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #781: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #782: Exporting with [default:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
d9:2e:dc:f5:c8:4f:ef:37:28:e2:39:c2:2c:a9:4a:b8
Iteration Count: 2000 (0x7d0)
tools.sh: #783: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #784: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #785: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
f6:16:39:bc:52:86:a0:85:16:00:b9:03:17:d7:90:e9
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #786: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #787: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #788: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
0c:03:01:5d:a7:92:6a:0c:ba:b5:2d:75:43:2b:65:27
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #789: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #790: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #791: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
48:ad:78:39:47:8c:28:e7:55:78:ee:a7:83:22:20:58
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #792: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #793: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #794: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
11:a4:40:18:d7:d9:47:db:b9:06:75:fc:9c:c2:75:4c
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #795: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #796: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #797: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
97:f2:9d:97:2e:38:94:69:b6:5c:0c:63:3d:63:b5:1d
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #798: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #799: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #800: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
87:f4:1b:9a:64:2d:72:7a:5a:80:7b:82:e9:47:e8:f6
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #801: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #802: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #803: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
a1:ff:7e:1f:44:a1:5e:ee:ba:f7:3c:d4:e7:1a:00:14
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #804: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #805: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #806: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
dc:a6:90:d8:20:e8:7c:a9:23:61:4d:0d:f2:11:f9:63
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #807: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #808: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #809: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
e7:b3:13:a7:f6:5f:a5:23:ec:32:48:0d:2a:60:20:ec
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #810: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #811: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #812: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
37:0c:d6:61:37:18:ba:74:c2:33:5c:b5:b5:b5:bf:0a
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:15 2012
Not After : Mon Nov 27 23:55:15 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
Fingerprint (MD5):
0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
Fingerprint (SHA1):
68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:22 2012
Not After : Mon Nov 27 23:55:22 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
Fingerprint (MD5):
12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
Fingerprint (SHA1):
62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F
Friendly Name: Alice
tools.sh: #813: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #814: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": security library: invalid algorithm.
tools.sh: #815: Exporting with [null:default] (pk12util -o) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #816: Exporting with [default:null] (pk12util -o) - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter
"y" to continue, or anything else to abort:
Enter certificate information. All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #817: Create objsign cert (signtool -G) - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%)
tree "../tools/html" signed successfully
tools.sh: #818: Signing a jar of files (signtool -Z) - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
md5 digest on global metainfo: match
sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa
status path
------------ -------------------
verified signjs.html
verified sign.html
tools.sh: #819: Listing signed files in jar (signtool -v) - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir
Signer information:
nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #820: Show who signed jar (signtool -w) - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
--> sign.html
Generating zigbert.sf file..
Creating XPI Compatible Archive
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #821: Signing a xpi of files (signtool -Z -X) - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
md5 digest on global metainfo: match
sha digest on global metainfo: match
status path
------------ -------------------
verified signjs.html
verified sign.html
tools.sh: #822: Listing signed files in xpi (signtool -v) - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir
Signer information:
nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #823: Show who signed xpi (signtool -w) - PASSED
TIMESTAMP tools END: Tue Nov 27 18:56:15 EST 2012
Running tests for fips
TIMESTAMP fips BEGIN: Tue Nov 27 18:56:15 EST 2012
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode -----------------
modutil -dbdir ../fips -list
Listing of PKCS #11 Modules
-----------------------------------------------------------
1. NSS Internal FIPS PKCS #11 Module
slots: 1 slot attached
status: loaded
slot: NSS FIPS 140-2 User Private Key Services
token: NSS FIPS 140-2 Certificate DB
2. RootCerts
library name: /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so
slots: 1 slot attached
status: loaded
slot: NSS Builtin Objects
token: Builtin Object Token
-----------------------------------------------------------
FIPS mode enabled.
fips.sh: #824: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
FIPS_PUB_140_Test_Certificate Cu,Cu,Cu
fips.sh: #825: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa 162e1342f74457c0df3b425bb3cbaf86529eeeee NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate
fips.sh: #826: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.fipsbadpw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect.
fips.sh: #827: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #828: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #829: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #830: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
FIPS_PUB_140_Test_Certificate Cu,Cu,Cu
fips.sh: #831: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #832: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
fips.sh: #833: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
certutil: no keys found
fips.sh: #834: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #835: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
FIPS_PUB_140_Test_Certificate u,u,u
fips.sh: #836: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa 162e1342f74457c0df3b425bb3cbaf86529eeeee FIPS_PUB_140_Test_Certificate
fips.sh: #837: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #838: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
fips.sh: #839: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #840: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
FIPS_PUB_140_Test_Certificate u,u,u
fips.sh: #841: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa 162e1342f74457c0df3b425bb3cbaf86529eeeee FIPS_PUB_140_Test_Certificate
fips.sh: #842: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
**** Total number of TESTS ran in FIPS MODE is 106. ****
**** ALL TESTS PASSED ****
fips.sh: #843: Run PK11MODE in FIPS mode (pk11mode) . - PASSED
fips.sh: Run PK11MODE in Non FIPSMODE -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
**** Total number of TESTS ran in NON FIPS MODE is 104. ****
**** ALL TESTS PASSED ****
fips.sh: #844: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED
mkdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcrmf.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libjar.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnspr4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnspr4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckfw.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsssysinit.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsssysinit.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssutil3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplc4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplc4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplds4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplds4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsqlite3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsqlite.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle/libsoftokn3.so
mangle -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle/libsoftokn3.so -o -8 -b 5
Changing byte 0x000b28a4 (731300): from 5f (95) to 7f (127)
LD_LIBRARY_PATH=/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle dbtest -r -d ../fips
fips.sh: #845: Init NSS with a corrupted library (dbtest -r) . - PASSED
fips.sh done
TIMESTAMP fips END: Tue Nov 27 18:56:28 EST 2012
Running tests for sdr
TIMESTAMP sdr BEGIN: Tue Nov 27 18:56:28 EST 2012
sdr.sh: SDR Tests ===============================
sdr.sh: Creating an SDR key/SDR Encrypt - Value 1
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v1.12297 -t "Test1"
sdr.sh: #846: Creating SDR Key/Encrypt - Value 1 - PASSED
sdr.sh: SDR Encrypt - Value 2
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v2.12297 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #847: Encrypt - Value 2 - PASSED
sdr.sh: SDR Encrypt - Value 3
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v3.12297 -t "1234567"
sdr.sh: #848: Encrypt - Value 3 - PASSED
sdr.sh: SDR Decrypt - Value 1
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v1.12297 -t "Test1"
sdr.sh: #849: Decrypt - Value 1 - PASSED
sdr.sh: SDR Decrypt - Value 2
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v2.12297 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #850: Decrypt - Value 2 - PASSED
sdr.sh: SDR Decrypt - Value 3
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v3.12297 -t "1234567"
sdr.sh: #851: Decrypt - Value 3 - PASSED
TIMESTAMP sdr END: Tue Nov 27 18:56:28 EST 2012
Running tests for crmf
TIMESTAMP crmf BEGIN: Tue Nov 27 18:56:28 EST 2012
crmf.sh: CRMF/CMMF Tests ===============================
crmf.sh: CRMF/CMMF Tests ------------------------------
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode
crmftest v1.0
Generating CRMF request
Decoding CRMF request
crmftest: Processing cert request 0
crmftest: Processing cert request 1
Exiting successfully!!!
crmf.sh: #852: CRMF test . - PASSED
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf
crmftest v1.0
Doing CMMF Stuff
Exiting successfully!!!
crmf.sh: #853: CMMF test . - PASSED
TIMESTAMP crmf END: Tue Nov 27 18:56:28 EST 2012
Running tests for smime
TIMESTAMP smime BEGIN: Tue Nov 27 18:56:28 EST 2012
smime.sh: S/MIME Tests with ECC ===============================
smime.sh: Signing Detached Message {SHA1} ------------------
cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1
smime.sh: #854: Create Detached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com
This is a test message from Alice to Bob.
smime.sh: #855: Verifying Alice's Detached Signature (SHA1) . - PASSED
smime.sh: Signing Attached Message (SHA1) ------------------
cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1
smime.sh: #856: Create Attached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1
smime.sh: #857: Decode Alice's Attached Signature (SHA1) . - PASSED
diff alice.txt alice.data.SHA1
smime.sh: #858: Compare Attached Signed Data and Original (SHA1) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------
cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1
smime.sh: #859: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com
This is a test message from Alice to Bob.
smime.sh: #860: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------
cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1
smime.sh: #861: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1
smime.sh: #862: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED
diff alice.txt alice-ec.data.SHA1
smime.sh: #863: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Detached Message {SHA256} ------------------
cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256
smime.sh: #864: Create Detached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com
This is a test message from Alice to Bob.
smime.sh: #865: Verifying Alice's Detached Signature (SHA256) . - PASSED
smime.sh: Signing Attached Message (SHA256) ------------------
cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256
smime.sh: #866: Create Attached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256
smime.sh: #867: Decode Alice's Attached Signature (SHA256) . - PASSED
diff alice.txt alice.data.SHA256
smime.sh: #868: Compare Attached Signed Data and Original (SHA256) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------
cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256
smime.sh: #869: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com
This is a test message from Alice to Bob.
smime.sh: #870: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------
cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256
smime.sh: #871: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256
smime.sh: #872: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED
diff alice.txt alice-ec.data.SHA256
smime.sh: #873: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Detached Message {SHA384} ------------------
cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384
smime.sh: #874: Create Detached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com
This is a test message from Alice to Bob.
smime.sh: #875: Verifying Alice's Detached Signature (SHA384) . - PASSED
smime.sh: Signing Attached Message (SHA384) ------------------
cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384
smime.sh: #876: Create Attached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384
smime.sh: #877: Decode Alice's Attached Signature (SHA384) . - PASSED
diff alice.txt alice.data.SHA384
smime.sh: #878: Compare Attached Signed Data and Original (SHA384) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------
cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384
smime.sh: #879: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com
This is a test message from Alice to Bob.
smime.sh: #880: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------
cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384
smime.sh: #881: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384
smime.sh: #882: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED
diff alice.txt alice-ec.data.SHA384
smime.sh: #883: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Detached Message {SHA512} ------------------
cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512
smime.sh: #884: Create Detached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com
This is a test message from Alice to Bob.
smime.sh: #885: Verifying Alice's Detached Signature (SHA512) . - PASSED
smime.sh: Signing Attached Message (SHA512) ------------------
cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512
smime.sh: #886: Create Attached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512
smime.sh: #887: Decode Alice's Attached Signature (SHA512) . - PASSED
diff alice.txt alice.data.SHA512
smime.sh: #888: Compare Attached Signed Data and Original (SHA512) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------
cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512
smime.sh: #889: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com
This is a test message from Alice to Bob.
smime.sh: #890: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------
cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512
smime.sh: #891: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512
smime.sh: #892: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED
diff alice.txt alice-ec.data.SHA512
smime.sh: #893: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED
smime.sh: Enveloped Data Tests ------------------------------
cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \
-o alice.env
smime.sh: #894: Create Enveloped Data Alice . - PASSED
cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1
smime.sh: #895: Decode Enveloped Data Alice . - PASSED
diff alice.txt alice.data1
smime.sh: #896: Compare Decoded Enveloped Data and Original . - PASSED
smime.sh: Testing multiple recipients ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \
-r bob@bogus.com,dave@bogus.com
smime.sh: #897: Create Multiple Recipients Enveloped Data Alice . - PASSED
smime.sh: Testing multiple email addrs ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \
-r eve@bogus.net
smime.sh: #898: Encrypt to a Multiple Email cert . - PASSED
cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2
smime.sh: #899: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED
cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3
smime.sh: #900: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED
cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4
smime.sh: #901: Decrypt with a Multiple Email cert . - PASSED
smime.sh: #902: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED
smime.sh: #903: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED
smime.sh: #904: Compare Decoded with Multiple Email cert . - PASSED
smime.sh: Sending CERTS-ONLY Message ------------------------------
cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \
-d ../alicedir > co.der
smime.sh: #905: Create Certs-Only Alice . - PASSED
cmsutil -D -i co.der -d ../bobdir
smime.sh: #906: Verify Certs-Only by CA . - PASSED
smime.sh: Encrypted-Data Message ---------------------------------
cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \
-r "bob@bogus.com" > alice.enc
smime.sh: #907: Create Encrypted-Data . - PASSED
cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \
-o alice.data2
smime.sh: #908: Decode Encrypted-Data . - PASSED
smime.sh: #909: Compare Decoded and Original Data . - PASSED
smime.sh: p7 util Data Tests ------------------------------
p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env
smime.sh: #910: Creating envelope for user Alice . - PASSED
p7content -d ../alicedir -i alice.env -o alice_p7.data
smime.sh: #911: Verifying file delivered to user Alice . - PASSED
diff alice.txt alice_p7.data.sed
smime.sh: #912: Compare Decoded Enveloped Data and Original . - PASSED
p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e
smime.sh: #913: Signing file for user Alice . - PASSED
p7verify -d ../alicedir -c alice.txt -s alice.sig
Signature is valid.
smime.sh: #914: Verifying file delivered to user Alice . - PASSED
TIMESTAMP smime END: Tue Nov 27 18:56:33 EST 2012
Running tests for ssl
TIMESTAMP ssl BEGIN: Tue Nov 27 18:56:33 EST 2012
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30393 >/dev/null 2>/dev/null
selfserv with PID 30393 found at Tue Nov 27 18:56:33 EST 2012
selfserv with PID 30393 started at Tue Nov 27 18:56:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #915: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30393 at Tue Nov 27 18:56:33 EST 2012
kill -USR1 30393
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30393 killed at Tue Nov 27 18:56:33 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30449 >/dev/null 2>/dev/null
selfserv with PID 30449 found at Tue Nov 27 18:56:33 EST 2012
selfserv with PID 30449 started at Tue Nov 27 18:56:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #916: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30449 at Tue Nov 27 18:56:33 EST 2012
kill -USR1 30449
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30449 killed at Tue Nov 27 18:56:33 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30505 >/dev/null 2>/dev/null
selfserv with PID 30505 found at Tue Nov 27 18:56:33 EST 2012
selfserv with PID 30505 started at Tue Nov 27 18:56:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #917: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30505 at Tue Nov 27 18:56:34 EST 2012
kill -USR1 30505
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30505 killed at Tue Nov 27 18:56:34 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30573 >/dev/null 2>/dev/null
selfserv with PID 30573 found at Tue Nov 27 18:56:34 EST 2012
selfserv with PID 30573 started at Tue Nov 27 18:56:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #918: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30573 at Tue Nov 27 18:56:34 EST 2012
kill -USR1 30573
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30573 killed at Tue Nov 27 18:56:34 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30629 >/dev/null 2>/dev/null
selfserv with PID 30629 found at Tue Nov 27 18:56:34 EST 2012
selfserv with PID 30629 started at Tue Nov 27 18:56:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #919: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30629 at Tue Nov 27 18:56:34 EST 2012
kill -USR1 30629
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30629 killed at Tue Nov 27 18:56:34 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30685 >/dev/null 2>/dev/null
selfserv with PID 30685 found at Tue Nov 27 18:56:34 EST 2012
selfserv with PID 30685 started at Tue Nov 27 18:56:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #920: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30685 at Tue Nov 27 18:56:34 EST 2012
kill -USR1 30685
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30685 killed at Tue Nov 27 18:56:34 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30753 >/dev/null 2>/dev/null
selfserv with PID 30753 found at Tue Nov 27 18:56:34 EST 2012
selfserv with PID 30753 started at Tue Nov 27 18:56:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #921: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30753 at Tue Nov 27 18:56:37 EST 2012
kill -USR1 30753
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30753 killed at Tue Nov 27 18:56:37 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30809 >/dev/null 2>/dev/null
selfserv with PID 30809 found at Tue Nov 27 18:56:37 EST 2012
selfserv with PID 30809 started at Tue Nov 27 18:56:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #922: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30809 at Tue Nov 27 18:56:37 EST 2012
kill -USR1 30809
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30809 killed at Tue Nov 27 18:56:37 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30865 >/dev/null 2>/dev/null
selfserv with PID 30865 found at Tue Nov 27 18:56:37 EST 2012
selfserv with PID 30865 started at Tue Nov 27 18:56:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #923: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30865 at Tue Nov 27 18:56:37 EST 2012
kill -USR1 30865
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30865 killed at Tue Nov 27 18:56:37 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30933 >/dev/null 2>/dev/null
selfserv with PID 30933 found at Tue Nov 27 18:56:38 EST 2012
selfserv with PID 30933 started at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #924: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30933 at Tue Nov 27 18:56:38 EST 2012
kill -USR1 30933
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30933 killed at Tue Nov 27 18:56:38 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30989 >/dev/null 2>/dev/null
selfserv with PID 30989 found at Tue Nov 27 18:56:38 EST 2012
selfserv with PID 30989 started at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #925: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30989 at Tue Nov 27 18:56:38 EST 2012
kill -USR1 30989
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30989 killed at Tue Nov 27 18:56:38 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31045 >/dev/null 2>/dev/null
selfserv with PID 31045 found at Tue Nov 27 18:56:38 EST 2012
selfserv with PID 31045 started at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #926: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31045 at Tue Nov 27 18:56:38 EST 2012
kill -USR1 31045
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31045 killed at Tue Nov 27 18:56:38 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31113 >/dev/null 2>/dev/null
selfserv with PID 31113 found at Tue Nov 27 18:56:38 EST 2012
selfserv with PID 31113 started at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #927: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31113 at Tue Nov 27 18:56:38 EST 2012
kill -USR1 31113
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31113 killed at Tue Nov 27 18:56:38 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31169 >/dev/null 2>/dev/null
selfserv with PID 31169 found at Tue Nov 27 18:56:38 EST 2012
selfserv with PID 31169 started at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #928: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31169 at Tue Nov 27 18:56:38 EST 2012
kill -USR1 31169
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31169 killed at Tue Nov 27 18:56:39 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31225 >/dev/null 2>/dev/null
selfserv with PID 31225 found at Tue Nov 27 18:56:39 EST 2012
selfserv with PID 31225 started at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #929: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31225 at Tue Nov 27 18:56:39 EST 2012
kill -USR1 31225
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31225 killed at Tue Nov 27 18:56:39 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31293 >/dev/null 2>/dev/null
selfserv with PID 31293 found at Tue Nov 27 18:56:39 EST 2012
selfserv with PID 31293 started at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #930: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31293 at Tue Nov 27 18:56:39 EST 2012
kill -USR1 31293
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31293 killed at Tue Nov 27 18:56:39 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31349 >/dev/null 2>/dev/null
selfserv with PID 31349 found at Tue Nov 27 18:56:39 EST 2012
selfserv with PID 31349 started at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #931: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31349 at Tue Nov 27 18:56:39 EST 2012
kill -USR1 31349
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31349 killed at Tue Nov 27 18:56:39 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31405 >/dev/null 2>/dev/null
selfserv with PID 31405 found at Tue Nov 27 18:56:39 EST 2012
selfserv with PID 31405 started at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #932: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31405 at Tue Nov 27 18:56:39 EST 2012
kill -USR1 31405
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31405 killed at Tue Nov 27 18:56:39 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31473 >/dev/null 2>/dev/null
selfserv with PID 31473 found at Tue Nov 27 18:56:39 EST 2012
selfserv with PID 31473 started at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #933: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31473 at Tue Nov 27 18:56:40 EST 2012
kill -USR1 31473
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31473 killed at Tue Nov 27 18:56:40 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31529 >/dev/null 2>/dev/null
selfserv with PID 31529 found at Tue Nov 27 18:56:40 EST 2012
selfserv with PID 31529 started at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #934: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31529 at Tue Nov 27 18:56:40 EST 2012
kill -USR1 31529
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31529 killed at Tue Nov 27 18:56:40 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31585 >/dev/null 2>/dev/null
selfserv with PID 31585 found at Tue Nov 27 18:56:40 EST 2012
selfserv with PID 31585 started at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #935: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31585 at Tue Nov 27 18:56:40 EST 2012
kill -USR1 31585
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31585 killed at Tue Nov 27 18:56:40 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31653 >/dev/null 2>/dev/null
selfserv with PID 31653 found at Tue Nov 27 18:56:40 EST 2012
selfserv with PID 31653 started at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #936: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31653 at Tue Nov 27 18:56:40 EST 2012
kill -USR1 31653
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31653 killed at Tue Nov 27 18:56:40 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31709 >/dev/null 2>/dev/null
selfserv with PID 31709 found at Tue Nov 27 18:56:40 EST 2012
selfserv with PID 31709 started at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #937: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31709 at Tue Nov 27 18:56:40 EST 2012
kill -USR1 31709
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31709 killed at Tue Nov 27 18:56:40 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31765 >/dev/null 2>/dev/null
selfserv with PID 31765 found at Tue Nov 27 18:56:40 EST 2012
selfserv with PID 31765 started at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #938: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31765 at Tue Nov 27 18:56:41 EST 2012
kill -USR1 31765
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31765 killed at Tue Nov 27 18:56:41 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31833 >/dev/null 2>/dev/null
selfserv with PID 31833 found at Tue Nov 27 18:56:41 EST 2012
selfserv with PID 31833 started at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #939: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31833 at Tue Nov 27 18:56:41 EST 2012
kill -USR1 31833
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31833 killed at Tue Nov 27 18:56:41 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31889 >/dev/null 2>/dev/null
selfserv with PID 31889 found at Tue Nov 27 18:56:41 EST 2012
selfserv with PID 31889 started at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #940: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31889 at Tue Nov 27 18:56:41 EST 2012
kill -USR1 31889
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31889 killed at Tue Nov 27 18:56:41 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31945 >/dev/null 2>/dev/null
selfserv with PID 31945 found at Tue Nov 27 18:56:41 EST 2012
selfserv with PID 31945 started at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #941: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31945 at Tue Nov 27 18:56:41 EST 2012
kill -USR1 31945
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31945 killed at Tue Nov 27 18:56:41 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32013 >/dev/null 2>/dev/null
selfserv with PID 32013 found at Tue Nov 27 18:56:41 EST 2012
selfserv with PID 32013 started at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #942: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 32013 at Tue Nov 27 18:56:41 EST 2012
kill -USR1 32013
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32013 killed at Tue Nov 27 18:56:41 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32069 >/dev/null 2>/dev/null
selfserv with PID 32069 found at Tue Nov 27 18:56:41 EST 2012
selfserv with PID 32069 started at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #943: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 32069 at Tue Nov 27 18:56:42 EST 2012
kill -USR1 32069
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32069 killed at Tue Nov 27 18:56:42 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Tue Nov 27 18:56:42 EST 2012
selfserv with PID 32125 started at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #944: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 32125 at Tue Nov 27 18:56:42 EST 2012
kill -USR1 32125
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32125 killed at Tue Nov 27 18:56:42 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32193 >/dev/null 2>/dev/null
selfserv with PID 32193 found at Tue Nov 27 18:56:42 EST 2012
selfserv with PID 32193 started at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #945: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 32193 at Tue Nov 27 18:56:42 EST 2012
kill -USR1 32193
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32193 killed at Tue Nov 27 18:56:42 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32249 >/dev/null 2>/dev/null
selfserv with PID 32249 found at Tue Nov 27 18:56:42 EST 2012
selfserv with PID 32249 started at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #946: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 32249 at Tue Nov 27 18:56:42 EST 2012
kill -USR1 32249
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32249 killed at Tue Nov 27 18:56:42 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32305 >/dev/null 2>/dev/null
selfserv with PID 32305 found at Tue Nov 27 18:56:42 EST 2012
selfserv with PID 32305 started at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #947: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 32305 at Tue Nov 27 18:56:42 EST 2012
kill -USR1 32305
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32305 killed at Tue Nov 27 18:56:42 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32374 >/dev/null 2>/dev/null
selfserv with PID 32374 found at Tue Nov 27 18:56:42 EST 2012
selfserv with PID 32374 started at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #948: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 32374 at Tue Nov 27 18:56:43 EST 2012
kill -USR1 32374
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32374 killed at Tue Nov 27 18:56:43 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32430 >/dev/null 2>/dev/null
selfserv with PID 32430 found at Tue Nov 27 18:56:43 EST 2012
selfserv with PID 32430 started at Tue Nov 27 18:56:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #949: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32430 at Tue Nov 27 18:56:43 EST 2012
kill -USR1 32430
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32430 killed at Tue Nov 27 18:56:43 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32486 >/dev/null 2>/dev/null
selfserv with PID 32486 found at Tue Nov 27 18:56:43 EST 2012
selfserv with PID 32486 started at Tue Nov 27 18:56:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #950: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 32486 at Tue Nov 27 18:56:43 EST 2012
kill -USR1 32486
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32486 killed at Tue Nov 27 18:56:43 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32554 >/dev/null 2>/dev/null
selfserv with PID 32554 found at Tue Nov 27 18:56:43 EST 2012
selfserv with PID 32554 started at Tue Nov 27 18:56:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #951: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32554 at Tue Nov 27 18:56:43 EST 2012
kill -USR1 32554
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32554 killed at Tue Nov 27 18:56:43 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32610 >/dev/null 2>/dev/null
selfserv with PID 32610 found at Tue Nov 27 18:56:43 EST 2012
selfserv with PID 32610 started at Tue Nov 27 18:56:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #952: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32610 at Tue Nov 27 18:56:44 EST 2012
kill -USR1 32610
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32610 killed at Tue Nov 27 18:56:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32666 >/dev/null 2>/dev/null
selfserv with PID 32666 found at Tue Nov 27 18:56:44 EST 2012
selfserv with PID 32666 started at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #953: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32666 at Tue Nov 27 18:56:44 EST 2012
kill -USR1 32666
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32666 killed at Tue Nov 27 18:56:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32734 >/dev/null 2>/dev/null
selfserv with PID 32734 found at Tue Nov 27 18:56:44 EST 2012
selfserv with PID 32734 started at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #954: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32734 at Tue Nov 27 18:56:44 EST 2012
kill -USR1 32734
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32734 killed at Tue Nov 27 18:56:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 325 >/dev/null 2>/dev/null
selfserv with PID 325 found at Tue Nov 27 18:56:44 EST 2012
selfserv with PID 325 started at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #955: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 325 at Tue Nov 27 18:56:44 EST 2012
kill -USR1 325
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 325 killed at Tue Nov 27 18:56:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 383 >/dev/null 2>/dev/null
selfserv with PID 383 found at Tue Nov 27 18:56:44 EST 2012
selfserv with PID 383 started at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #956: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 383 at Tue Nov 27 18:56:44 EST 2012
kill -USR1 383
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 383 killed at Tue Nov 27 18:56:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 457 >/dev/null 2>/dev/null
selfserv with PID 457 found at Tue Nov 27 18:56:44 EST 2012
selfserv with PID 457 started at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #957: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 457 at Tue Nov 27 18:56:45 EST 2012
kill -USR1 457
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 457 killed at Tue Nov 27 18:56:45 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 524 >/dev/null 2>/dev/null
selfserv with PID 524 found at Tue Nov 27 18:56:45 EST 2012
selfserv with PID 524 started at Tue Nov 27 18:56:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #958: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 524 at Tue Nov 27 18:56:45 EST 2012
kill -USR1 524
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 524 killed at Tue Nov 27 18:56:45 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 595 >/dev/null 2>/dev/null
selfserv with PID 595 found at Tue Nov 27 18:56:45 EST 2012
selfserv with PID 595 started at Tue Nov 27 18:56:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #959: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 595 at Tue Nov 27 18:56:45 EST 2012
kill -USR1 595
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 595 killed at Tue Nov 27 18:56:45 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 678 >/dev/null 2>/dev/null
selfserv with PID 678 found at Tue Nov 27 18:56:45 EST 2012
selfserv with PID 678 started at Tue Nov 27 18:56:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #960: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 678 at Tue Nov 27 18:56:45 EST 2012
kill -USR1 678
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 678 killed at Tue Nov 27 18:56:45 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 739 >/dev/null 2>/dev/null
selfserv with PID 739 found at Tue Nov 27 18:56:45 EST 2012
selfserv with PID 739 started at Tue Nov 27 18:56:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #961: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 739 at Tue Nov 27 18:56:45 EST 2012
kill -USR1 739
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 739 killed at Tue Nov 27 18:56:45 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 796 >/dev/null 2>/dev/null
selfserv with PID 796 found at Tue Nov 27 18:56:46 EST 2012
selfserv with PID 796 started at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #962: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 796 at Tue Nov 27 18:56:46 EST 2012
kill -USR1 796
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 796 killed at Tue Nov 27 18:56:46 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 889 >/dev/null 2>/dev/null
selfserv with PID 889 found at Tue Nov 27 18:56:46 EST 2012
selfserv with PID 889 started at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #963: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 889 at Tue Nov 27 18:56:46 EST 2012
kill -USR1 889
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 889 killed at Tue Nov 27 18:56:46 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 976 >/dev/null 2>/dev/null
selfserv with PID 976 found at Tue Nov 27 18:56:46 EST 2012
selfserv with PID 976 started at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #964: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 976 at Tue Nov 27 18:56:46 EST 2012
kill -USR1 976
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 976 killed at Tue Nov 27 18:56:46 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1032 >/dev/null 2>/dev/null
selfserv with PID 1032 found at Tue Nov 27 18:56:46 EST 2012
selfserv with PID 1032 started at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #965: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1032 at Tue Nov 27 18:56:46 EST 2012
kill -USR1 1032
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1032 killed at Tue Nov 27 18:56:46 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1100 >/dev/null 2>/dev/null
selfserv with PID 1100 found at Tue Nov 27 18:56:46 EST 2012
selfserv with PID 1100 started at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #966: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1100 at Tue Nov 27 18:56:47 EST 2012
kill -USR1 1100
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1100 killed at Tue Nov 27 18:56:47 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1156 >/dev/null 2>/dev/null
selfserv with PID 1156 found at Tue Nov 27 18:56:47 EST 2012
selfserv with PID 1156 started at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #967: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1156 at Tue Nov 27 18:56:47 EST 2012
kill -USR1 1156
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1156 killed at Tue Nov 27 18:56:47 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1212 >/dev/null 2>/dev/null
selfserv with PID 1212 found at Tue Nov 27 18:56:47 EST 2012
selfserv with PID 1212 started at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #968: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1212 at Tue Nov 27 18:56:47 EST 2012
kill -USR1 1212
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1212 killed at Tue Nov 27 18:56:47 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1280 >/dev/null 2>/dev/null
selfserv with PID 1280 found at Tue Nov 27 18:56:47 EST 2012
selfserv with PID 1280 started at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #969: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1280 at Tue Nov 27 18:56:47 EST 2012
kill -USR1 1280
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1280 killed at Tue Nov 27 18:56:47 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1336 >/dev/null 2>/dev/null
selfserv with PID 1336 found at Tue Nov 27 18:56:47 EST 2012
selfserv with PID 1336 started at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #970: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1336 at Tue Nov 27 18:56:47 EST 2012
kill -USR1 1336
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1336 killed at Tue Nov 27 18:56:47 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1392 >/dev/null 2>/dev/null
selfserv with PID 1392 found at Tue Nov 27 18:56:47 EST 2012
selfserv with PID 1392 started at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #971: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1392 at Tue Nov 27 18:56:48 EST 2012
kill -USR1 1392
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1392 killed at Tue Nov 27 18:56:48 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1460 >/dev/null 2>/dev/null
selfserv with PID 1460 found at Tue Nov 27 18:56:48 EST 2012
selfserv with PID 1460 started at Tue Nov 27 18:56:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #972: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1460 at Tue Nov 27 18:56:48 EST 2012
kill -USR1 1460
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1460 killed at Tue Nov 27 18:56:48 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1517 >/dev/null 2>/dev/null
selfserv with PID 1517 found at Tue Nov 27 18:56:48 EST 2012
selfserv with PID 1517 started at Tue Nov 27 18:56:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #973: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1517 at Tue Nov 27 18:56:48 EST 2012
kill -USR1 1517
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1517 killed at Tue Nov 27 18:56:48 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1573 >/dev/null 2>/dev/null
selfserv with PID 1573 found at Tue Nov 27 18:56:48 EST 2012
selfserv with PID 1573 started at Tue Nov 27 18:56:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #974: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1573 at Tue Nov 27 18:56:48 EST 2012
kill -USR1 1573
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1573 killed at Tue Nov 27 18:56:48 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1641 >/dev/null 2>/dev/null
selfserv with PID 1641 found at Tue Nov 27 18:56:48 EST 2012
selfserv with PID 1641 started at Tue Nov 27 18:56:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #975: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1641 at Tue Nov 27 18:56:49 EST 2012
kill -USR1 1641
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1641 killed at Tue Nov 27 18:56:49 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1697 >/dev/null 2>/dev/null
selfserv with PID 1697 found at Tue Nov 27 18:56:49 EST 2012
selfserv with PID 1697 started at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #976: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1697 at Tue Nov 27 18:56:49 EST 2012
kill -USR1 1697
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1697 killed at Tue Nov 27 18:56:49 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1753 >/dev/null 2>/dev/null
selfserv with PID 1753 found at Tue Nov 27 18:56:49 EST 2012
selfserv with PID 1753 started at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #977: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1753 at Tue Nov 27 18:56:49 EST 2012
kill -USR1 1753
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1753 killed at Tue Nov 27 18:56:49 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1821 >/dev/null 2>/dev/null
selfserv with PID 1821 found at Tue Nov 27 18:56:49 EST 2012
selfserv with PID 1821 started at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #978: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1821 at Tue Nov 27 18:56:49 EST 2012
kill -USR1 1821
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1821 killed at Tue Nov 27 18:56:49 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1877 >/dev/null 2>/dev/null
selfserv with PID 1877 found at Tue Nov 27 18:56:49 EST 2012
selfserv with PID 1877 started at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #979: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1877 at Tue Nov 27 18:56:49 EST 2012
kill -USR1 1877
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1877 killed at Tue Nov 27 18:56:49 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1933 >/dev/null 2>/dev/null
selfserv with PID 1933 found at Tue Nov 27 18:56:49 EST 2012
selfserv with PID 1933 started at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #980: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1933 at Tue Nov 27 18:56:50 EST 2012
kill -USR1 1933
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1933 killed at Tue Nov 27 18:56:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2001 >/dev/null 2>/dev/null
selfserv with PID 2001 found at Tue Nov 27 18:56:50 EST 2012
selfserv with PID 2001 started at Tue Nov 27 18:56:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #981: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2001 at Tue Nov 27 18:56:50 EST 2012
kill -USR1 2001
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2001 killed at Tue Nov 27 18:56:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2057 >/dev/null 2>/dev/null
selfserv with PID 2057 found at Tue Nov 27 18:56:50 EST 2012
selfserv with PID 2057 started at Tue Nov 27 18:56:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #982: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2057 at Tue Nov 27 18:56:50 EST 2012
kill -USR1 2057
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2057 killed at Tue Nov 27 18:56:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2113 >/dev/null 2>/dev/null
selfserv with PID 2113 found at Tue Nov 27 18:56:50 EST 2012
selfserv with PID 2113 started at Tue Nov 27 18:56:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #983: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2113 at Tue Nov 27 18:56:50 EST 2012
kill -USR1 2113
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2113 killed at Tue Nov 27 18:56:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2181 >/dev/null 2>/dev/null
selfserv with PID 2181 found at Tue Nov 27 18:56:50 EST 2012
selfserv with PID 2181 started at Tue Nov 27 18:56:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #984: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2181 at Tue Nov 27 18:56:50 EST 2012
kill -USR1 2181
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2181 killed at Tue Nov 27 18:56:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2238 >/dev/null 2>/dev/null
selfserv with PID 2238 found at Tue Nov 27 18:56:51 EST 2012
selfserv with PID 2238 started at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #985: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2238 at Tue Nov 27 18:56:51 EST 2012
kill -USR1 2238
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2238 killed at Tue Nov 27 18:56:51 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2294 >/dev/null 2>/dev/null
selfserv with PID 2294 found at Tue Nov 27 18:56:51 EST 2012
selfserv with PID 2294 started at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #986: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2294 at Tue Nov 27 18:56:51 EST 2012
kill -USR1 2294
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2294 killed at Tue Nov 27 18:56:51 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2362 >/dev/null 2>/dev/null
selfserv with PID 2362 found at Tue Nov 27 18:56:51 EST 2012
selfserv with PID 2362 started at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #987: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2362 at Tue Nov 27 18:56:51 EST 2012
kill -USR1 2362
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2362 killed at Tue Nov 27 18:56:51 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2418 >/dev/null 2>/dev/null
selfserv with PID 2418 found at Tue Nov 27 18:56:51 EST 2012
selfserv with PID 2418 started at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #988: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2418 at Tue Nov 27 18:56:51 EST 2012
kill -USR1 2418
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2418 killed at Tue Nov 27 18:56:51 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2474 >/dev/null 2>/dev/null
selfserv with PID 2474 found at Tue Nov 27 18:56:51 EST 2012
selfserv with PID 2474 started at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #989: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2474 at Tue Nov 27 18:56:52 EST 2012
kill -USR1 2474
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2474 killed at Tue Nov 27 18:56:52 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2542 >/dev/null 2>/dev/null
selfserv with PID 2542 found at Tue Nov 27 18:56:52 EST 2012
selfserv with PID 2542 started at Tue Nov 27 18:56:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2542 at Tue Nov 27 18:56:52 EST 2012
kill -USR1 2542
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2542 killed at Tue Nov 27 18:56:52 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2598 >/dev/null 2>/dev/null
selfserv with PID 2598 found at Tue Nov 27 18:56:52 EST 2012
selfserv with PID 2598 started at Tue Nov 27 18:56:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2598 at Tue Nov 27 18:56:52 EST 2012
kill -USR1 2598
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2598 killed at Tue Nov 27 18:56:52 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2654 >/dev/null 2>/dev/null
selfserv with PID 2654 found at Tue Nov 27 18:56:52 EST 2012
selfserv with PID 2654 started at Tue Nov 27 18:56:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #992: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2654 at Tue Nov 27 18:56:52 EST 2012
kill -USR1 2654
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2654 killed at Tue Nov 27 18:56:52 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2723 >/dev/null 2>/dev/null
selfserv with PID 2723 found at Tue Nov 27 18:56:52 EST 2012
selfserv with PID 2723 started at Tue Nov 27 18:56:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #993: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2723 at Tue Nov 27 18:56:53 EST 2012
kill -USR1 2723
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2723 killed at Tue Nov 27 18:56:53 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2779 >/dev/null 2>/dev/null
selfserv with PID 2779 found at Tue Nov 27 18:56:53 EST 2012
selfserv with PID 2779 started at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #994: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2779 at Tue Nov 27 18:56:53 EST 2012
kill -USR1 2779
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2779 killed at Tue Nov 27 18:56:53 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2835 >/dev/null 2>/dev/null
selfserv with PID 2835 found at Tue Nov 27 18:56:53 EST 2012
selfserv with PID 2835 started at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #995: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2835 at Tue Nov 27 18:56:53 EST 2012
kill -USR1 2835
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2835 killed at Tue Nov 27 18:56:53 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2903 >/dev/null 2>/dev/null
selfserv with PID 2903 found at Tue Nov 27 18:56:53 EST 2012
selfserv with PID 2903 started at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #996: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2903 at Tue Nov 27 18:56:53 EST 2012
kill -USR1 2903
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2903 killed at Tue Nov 27 18:56:53 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2959 >/dev/null 2>/dev/null
selfserv with PID 2959 found at Tue Nov 27 18:56:53 EST 2012
selfserv with PID 2959 started at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #997: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2959 at Tue Nov 27 18:56:53 EST 2012
kill -USR1 2959
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2959 killed at Tue Nov 27 18:56:53 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3015 >/dev/null 2>/dev/null
selfserv with PID 3015 found at Tue Nov 27 18:56:53 EST 2012
selfserv with PID 3015 started at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #998: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3015 at Tue Nov 27 18:56:54 EST 2012
kill -USR1 3015
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3015 killed at Tue Nov 27 18:56:54 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3083 >/dev/null 2>/dev/null
selfserv with PID 3083 found at Tue Nov 27 18:56:54 EST 2012
selfserv with PID 3083 started at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #999: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3083 at Tue Nov 27 18:56:54 EST 2012
kill -USR1 3083
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3083 killed at Tue Nov 27 18:56:54 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3139 >/dev/null 2>/dev/null
selfserv with PID 3139 found at Tue Nov 27 18:56:54 EST 2012
selfserv with PID 3139 started at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1000: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3139 at Tue Nov 27 18:56:54 EST 2012
kill -USR1 3139
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3139 killed at Tue Nov 27 18:56:54 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3195 >/dev/null 2>/dev/null
selfserv with PID 3195 found at Tue Nov 27 18:56:54 EST 2012
selfserv with PID 3195 started at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1001: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3195 at Tue Nov 27 18:56:54 EST 2012
kill -USR1 3195
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3195 killed at Tue Nov 27 18:56:54 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3263 >/dev/null 2>/dev/null
selfserv with PID 3263 found at Tue Nov 27 18:56:54 EST 2012
selfserv with PID 3263 started at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1002: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3263 at Tue Nov 27 18:56:54 EST 2012
kill -USR1 3263
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3263 killed at Tue Nov 27 18:56:54 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3320 >/dev/null 2>/dev/null
selfserv with PID 3320 found at Tue Nov 27 18:56:54 EST 2012
selfserv with PID 3320 started at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1003: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3320 at Tue Nov 27 18:56:55 EST 2012
kill -USR1 3320
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3320 killed at Tue Nov 27 18:56:55 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3376 >/dev/null 2>/dev/null
selfserv with PID 3376 found at Tue Nov 27 18:56:55 EST 2012
selfserv with PID 3376 started at Tue Nov 27 18:56:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1004: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3376 at Tue Nov 27 18:56:55 EST 2012
kill -USR1 3376
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3376 killed at Tue Nov 27 18:56:55 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3453 >/dev/null 2>/dev/null
selfserv with PID 3453 found at Tue Nov 27 18:56:55 EST 2012
selfserv with PID 3453 started at Tue Nov 27 18:56:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1005: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3453 at Tue Nov 27 18:56:55 EST 2012
kill -USR1 3453
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3453 killed at Tue Nov 27 18:56:55 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3509 >/dev/null 2>/dev/null
selfserv with PID 3509 found at Tue Nov 27 18:56:55 EST 2012
selfserv with PID 3509 started at Tue Nov 27 18:56:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1006: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3509 at Tue Nov 27 18:56:55 EST 2012
kill -USR1 3509
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3509 killed at Tue Nov 27 18:56:55 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3565 >/dev/null 2>/dev/null
selfserv with PID 3565 found at Tue Nov 27 18:56:55 EST 2012
selfserv with PID 3565 started at Tue Nov 27 18:56:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1007: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3565 at Tue Nov 27 18:56:56 EST 2012
kill -USR1 3565
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3565 killed at Tue Nov 27 18:56:56 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3633 >/dev/null 2>/dev/null
selfserv with PID 3633 found at Tue Nov 27 18:56:56 EST 2012
selfserv with PID 3633 started at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1008: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3633 at Tue Nov 27 18:56:56 EST 2012
kill -USR1 3633
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3633 killed at Tue Nov 27 18:56:56 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3689 >/dev/null 2>/dev/null
selfserv with PID 3689 found at Tue Nov 27 18:56:56 EST 2012
selfserv with PID 3689 started at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1009: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3689 at Tue Nov 27 18:56:56 EST 2012
kill -USR1 3689
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3689 killed at Tue Nov 27 18:56:56 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3745 >/dev/null 2>/dev/null
selfserv with PID 3745 found at Tue Nov 27 18:56:56 EST 2012
selfserv with PID 3745 started at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1010: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3745 at Tue Nov 27 18:56:56 EST 2012
kill -USR1 3745
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3745 killed at Tue Nov 27 18:56:56 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3813 >/dev/null 2>/dev/null
selfserv with PID 3813 found at Tue Nov 27 18:56:56 EST 2012
selfserv with PID 3813 started at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1011: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3813 at Tue Nov 27 18:56:56 EST 2012
kill -USR1 3813
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3813 killed at Tue Nov 27 18:56:56 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3869 >/dev/null 2>/dev/null
selfserv with PID 3869 found at Tue Nov 27 18:56:57 EST 2012
selfserv with PID 3869 started at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1012: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3869 at Tue Nov 27 18:56:57 EST 2012
kill -USR1 3869
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3869 killed at Tue Nov 27 18:56:57 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3925 >/dev/null 2>/dev/null
selfserv with PID 3925 found at Tue Nov 27 18:56:57 EST 2012
selfserv with PID 3925 started at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1013: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3925 at Tue Nov 27 18:56:57 EST 2012
kill -USR1 3925
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3925 killed at Tue Nov 27 18:56:57 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3993 >/dev/null 2>/dev/null
selfserv with PID 3993 found at Tue Nov 27 18:56:57 EST 2012
selfserv with PID 3993 started at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1014: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3993 at Tue Nov 27 18:56:57 EST 2012
kill -USR1 3993
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3993 killed at Tue Nov 27 18:56:57 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4049 >/dev/null 2>/dev/null
selfserv with PID 4049 found at Tue Nov 27 18:56:57 EST 2012
selfserv with PID 4049 started at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1015: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4049 at Tue Nov 27 18:56:57 EST 2012
kill -USR1 4049
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4049 killed at Tue Nov 27 18:56:57 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4105 >/dev/null 2>/dev/null
selfserv with PID 4105 found at Tue Nov 27 18:56:57 EST 2012
selfserv with PID 4105 started at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1016: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4105 at Tue Nov 27 18:56:58 EST 2012
kill -USR1 4105
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4105 killed at Tue Nov 27 18:56:58 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4173 >/dev/null 2>/dev/null
selfserv with PID 4173 found at Tue Nov 27 18:56:58 EST 2012
selfserv with PID 4173 started at Tue Nov 27 18:56:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1017: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4173 at Tue Nov 27 18:56:58 EST 2012
kill -USR1 4173
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4173 killed at Tue Nov 27 18:56:58 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4229 >/dev/null 2>/dev/null
selfserv with PID 4229 found at Tue Nov 27 18:56:58 EST 2012
selfserv with PID 4229 started at Tue Nov 27 18:56:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1018: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4229 at Tue Nov 27 18:56:58 EST 2012
kill -USR1 4229
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4229 killed at Tue Nov 27 18:56:58 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4285 >/dev/null 2>/dev/null
selfserv with PID 4285 found at Tue Nov 27 18:56:58 EST 2012
selfserv with PID 4285 started at Tue Nov 27 18:56:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1019: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4285 at Tue Nov 27 18:56:58 EST 2012
kill -USR1 4285
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4285 killed at Tue Nov 27 18:56:58 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4353 >/dev/null 2>/dev/null
selfserv with PID 4353 found at Tue Nov 27 18:56:58 EST 2012
selfserv with PID 4353 started at Tue Nov 27 18:56:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1020: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4353 at Tue Nov 27 18:56:59 EST 2012
kill -USR1 4353
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4353 killed at Tue Nov 27 18:56:59 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4410 >/dev/null 2>/dev/null
selfserv with PID 4410 found at Tue Nov 27 18:56:59 EST 2012
selfserv with PID 4410 started at Tue Nov 27 18:56:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1021: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4410 at Tue Nov 27 18:56:59 EST 2012
kill -USR1 4410
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4410 killed at Tue Nov 27 18:56:59 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4466 >/dev/null 2>/dev/null
selfserv with PID 4466 found at Tue Nov 27 18:56:59 EST 2012
selfserv with PID 4466 started at Tue Nov 27 18:56:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1022: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4466 at Tue Nov 27 18:56:59 EST 2012
kill -USR1 4466
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4466 killed at Tue Nov 27 18:56:59 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:56:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4534 >/dev/null 2>/dev/null
selfserv with PID 4534 found at Tue Nov 27 18:56:59 EST 2012
selfserv with PID 4534 started at Tue Nov 27 18:56:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1023: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4534 at Tue Nov 27 18:56:59 EST 2012
kill -USR1 4534
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4534 killed at Tue Nov 27 18:56:59 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4590 >/dev/null 2>/dev/null
selfserv with PID 4590 found at Tue Nov 27 18:57:00 EST 2012
selfserv with PID 4590 started at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1024: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4590 at Tue Nov 27 18:57:00 EST 2012
kill -USR1 4590
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4590 killed at Tue Nov 27 18:57:00 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4646 >/dev/null 2>/dev/null
selfserv with PID 4646 found at Tue Nov 27 18:57:00 EST 2012
selfserv with PID 4646 started at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1025: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4646 at Tue Nov 27 18:57:00 EST 2012
kill -USR1 4646
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4646 killed at Tue Nov 27 18:57:00 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4714 >/dev/null 2>/dev/null
selfserv with PID 4714 found at Tue Nov 27 18:57:00 EST 2012
selfserv with PID 4714 started at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1026: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4714 at Tue Nov 27 18:57:00 EST 2012
kill -USR1 4714
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4714 killed at Tue Nov 27 18:57:00 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4770 >/dev/null 2>/dev/null
selfserv with PID 4770 found at Tue Nov 27 18:57:00 EST 2012
selfserv with PID 4770 started at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1027: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4770 at Tue Nov 27 18:57:00 EST 2012
kill -USR1 4770
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4770 killed at Tue Nov 27 18:57:00 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4826 >/dev/null 2>/dev/null
selfserv with PID 4826 found at Tue Nov 27 18:57:00 EST 2012
selfserv with PID 4826 started at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1028: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4826 at Tue Nov 27 18:57:01 EST 2012
kill -USR1 4826
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4826 killed at Tue Nov 27 18:57:01 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4894 >/dev/null 2>/dev/null
selfserv with PID 4894 found at Tue Nov 27 18:57:01 EST 2012
selfserv with PID 4894 started at Tue Nov 27 18:57:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1029: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4894 at Tue Nov 27 18:57:01 EST 2012
kill -USR1 4894
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4894 killed at Tue Nov 27 18:57:01 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4950 >/dev/null 2>/dev/null
selfserv with PID 4950 found at Tue Nov 27 18:57:01 EST 2012
selfserv with PID 4950 started at Tue Nov 27 18:57:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1030: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4950 at Tue Nov 27 18:57:01 EST 2012
kill -USR1 4950
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4950 killed at Tue Nov 27 18:57:01 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5007 >/dev/null 2>/dev/null
selfserv with PID 5007 found at Tue Nov 27 18:57:01 EST 2012
selfserv with PID 5007 started at Tue Nov 27 18:57:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1031: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5007 at Tue Nov 27 18:57:01 EST 2012
kill -USR1 5007
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5007 killed at Tue Nov 27 18:57:01 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5075 >/dev/null 2>/dev/null
selfserv with PID 5075 found at Tue Nov 27 18:57:01 EST 2012
selfserv with PID 5075 started at Tue Nov 27 18:57:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1032: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5075 at Tue Nov 27 18:57:02 EST 2012
kill -USR1 5075
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5075 killed at Tue Nov 27 18:57:02 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5131 >/dev/null 2>/dev/null
selfserv with PID 5131 found at Tue Nov 27 18:57:02 EST 2012
selfserv with PID 5131 started at Tue Nov 27 18:57:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1033: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5131 at Tue Nov 27 18:57:02 EST 2012
kill -USR1 5131
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5131 killed at Tue Nov 27 18:57:02 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Tue Nov 27 18:57:02 EST 2012
selfserv with PID 5187 started at Tue Nov 27 18:57:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1034: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5187 at Tue Nov 27 18:57:02 EST 2012
kill -USR1 5187
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5187 killed at Tue Nov 27 18:57:02 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5255 >/dev/null 2>/dev/null
selfserv with PID 5255 found at Tue Nov 27 18:57:02 EST 2012
selfserv with PID 5255 started at Tue Nov 27 18:57:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1035: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5255 at Tue Nov 27 18:57:02 EST 2012
kill -USR1 5255
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5255 killed at Tue Nov 27 18:57:02 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5311 >/dev/null 2>/dev/null
selfserv with PID 5311 found at Tue Nov 27 18:57:02 EST 2012
selfserv with PID 5311 started at Tue Nov 27 18:57:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1036: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5311 at Tue Nov 27 18:57:03 EST 2012
kill -USR1 5311
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5311 killed at Tue Nov 27 18:57:03 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5368 >/dev/null 2>/dev/null
selfserv with PID 5368 found at Tue Nov 27 18:57:03 EST 2012
selfserv with PID 5368 started at Tue Nov 27 18:57:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1037: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5368 at Tue Nov 27 18:57:03 EST 2012
kill -USR1 5368
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5368 killed at Tue Nov 27 18:57:03 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5436 >/dev/null 2>/dev/null
selfserv with PID 5436 found at Tue Nov 27 18:57:03 EST 2012
selfserv with PID 5436 started at Tue Nov 27 18:57:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1038: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5436 at Tue Nov 27 18:57:03 EST 2012
kill -USR1 5436
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5436 killed at Tue Nov 27 18:57:03 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5492 >/dev/null 2>/dev/null
selfserv with PID 5492 found at Tue Nov 27 18:57:03 EST 2012
selfserv with PID 5492 started at Tue Nov 27 18:57:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1039: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5492 at Tue Nov 27 18:57:03 EST 2012
kill -USR1 5492
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5492 killed at Tue Nov 27 18:57:03 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5548 >/dev/null 2>/dev/null
selfserv with PID 5548 found at Tue Nov 27 18:57:03 EST 2012
selfserv with PID 5548 started at Tue Nov 27 18:57:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1040: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5548 at Tue Nov 27 18:57:03 EST 2012
kill -USR1 5548
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5548 killed at Tue Nov 27 18:57:04 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5616 >/dev/null 2>/dev/null
selfserv with PID 5616 found at Tue Nov 27 18:57:04 EST 2012
selfserv with PID 5616 started at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1041: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5616 at Tue Nov 27 18:57:04 EST 2012
kill -USR1 5616
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5616 killed at Tue Nov 27 18:57:04 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5672 >/dev/null 2>/dev/null
selfserv with PID 5672 found at Tue Nov 27 18:57:04 EST 2012
selfserv with PID 5672 started at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1042: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5672 at Tue Nov 27 18:57:04 EST 2012
kill -USR1 5672
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5672 killed at Tue Nov 27 18:57:04 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5728 >/dev/null 2>/dev/null
selfserv with PID 5728 found at Tue Nov 27 18:57:04 EST 2012
selfserv with PID 5728 started at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1043: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5728 at Tue Nov 27 18:57:04 EST 2012
kill -USR1 5728
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5728 killed at Tue Nov 27 18:57:04 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5796 >/dev/null 2>/dev/null
selfserv with PID 5796 found at Tue Nov 27 18:57:04 EST 2012
selfserv with PID 5796 started at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1044: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5796 at Tue Nov 27 18:57:04 EST 2012
kill -USR1 5796
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5796 killed at Tue Nov 27 18:57:04 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5852 >/dev/null 2>/dev/null
selfserv with PID 5852 found at Tue Nov 27 18:57:04 EST 2012
selfserv with PID 5852 started at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1045: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5852 at Tue Nov 27 18:57:05 EST 2012
kill -USR1 5852
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5852 killed at Tue Nov 27 18:57:05 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5908 >/dev/null 2>/dev/null
selfserv with PID 5908 found at Tue Nov 27 18:57:05 EST 2012
selfserv with PID 5908 started at Tue Nov 27 18:57:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1046: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5908 at Tue Nov 27 18:57:05 EST 2012
kill -USR1 5908
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5908 killed at Tue Nov 27 18:57:05 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5976 >/dev/null 2>/dev/null
selfserv with PID 5976 found at Tue Nov 27 18:57:05 EST 2012
selfserv with PID 5976 started at Tue Nov 27 18:57:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1047: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5976 at Tue Nov 27 18:57:05 EST 2012
kill -USR1 5976
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5976 killed at Tue Nov 27 18:57:05 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6032 >/dev/null 2>/dev/null
selfserv with PID 6032 found at Tue Nov 27 18:57:05 EST 2012
selfserv with PID 6032 started at Tue Nov 27 18:57:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1048: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6032 at Tue Nov 27 18:57:05 EST 2012
kill -USR1 6032
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6032 killed at Tue Nov 27 18:57:05 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6088 >/dev/null 2>/dev/null
selfserv with PID 6088 found at Tue Nov 27 18:57:05 EST 2012
selfserv with PID 6088 started at Tue Nov 27 18:57:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1049: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6088 at Tue Nov 27 18:57:05 EST 2012
kill -USR1 6088
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6088 killed at Tue Nov 27 18:57:05 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6157 >/dev/null 2>/dev/null
selfserv with PID 6157 found at Tue Nov 27 18:57:06 EST 2012
selfserv with PID 6157 started at Tue Nov 27 18:57:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1050: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6157 at Tue Nov 27 18:57:06 EST 2012
kill -USR1 6157
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6157 killed at Tue Nov 27 18:57:06 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6213 >/dev/null 2>/dev/null
selfserv with PID 6213 found at Tue Nov 27 18:57:06 EST 2012
selfserv with PID 6213 started at Tue Nov 27 18:57:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1051: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6213 at Tue Nov 27 18:57:06 EST 2012
kill -USR1 6213
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6213 killed at Tue Nov 27 18:57:06 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6269 >/dev/null 2>/dev/null
selfserv with PID 6269 found at Tue Nov 27 18:57:06 EST 2012
selfserv with PID 6269 started at Tue Nov 27 18:57:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1052: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6269 at Tue Nov 27 18:57:06 EST 2012
kill -USR1 6269
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6269 killed at Tue Nov 27 18:57:06 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6337 >/dev/null 2>/dev/null
selfserv with PID 6337 found at Tue Nov 27 18:57:06 EST 2012
selfserv with PID 6337 started at Tue Nov 27 18:57:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1053: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6337 at Tue Nov 27 18:57:06 EST 2012
kill -USR1 6337
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6337 killed at Tue Nov 27 18:57:06 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6393 >/dev/null 2>/dev/null
selfserv with PID 6393 found at Tue Nov 27 18:57:07 EST 2012
selfserv with PID 6393 started at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1054: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6393 at Tue Nov 27 18:57:07 EST 2012
kill -USR1 6393
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6393 killed at Tue Nov 27 18:57:07 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6449 >/dev/null 2>/dev/null
selfserv with PID 6449 found at Tue Nov 27 18:57:07 EST 2012
selfserv with PID 6449 started at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1055: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6449 at Tue Nov 27 18:57:07 EST 2012
kill -USR1 6449
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6449 killed at Tue Nov 27 18:57:07 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6517 >/dev/null 2>/dev/null
selfserv with PID 6517 found at Tue Nov 27 18:57:07 EST 2012
selfserv with PID 6517 started at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1056: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6517 at Tue Nov 27 18:57:07 EST 2012
kill -USR1 6517
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6517 killed at Tue Nov 27 18:57:07 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6573 >/dev/null 2>/dev/null
selfserv with PID 6573 found at Tue Nov 27 18:57:07 EST 2012
selfserv with PID 6573 started at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1057: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6573 at Tue Nov 27 18:57:07 EST 2012
kill -USR1 6573
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6573 killed at Tue Nov 27 18:57:07 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6629 >/dev/null 2>/dev/null
selfserv with PID 6629 found at Tue Nov 27 18:57:07 EST 2012
selfserv with PID 6629 started at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1058: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6629 at Tue Nov 27 18:57:08 EST 2012
kill -USR1 6629
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6629 killed at Tue Nov 27 18:57:08 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6697 >/dev/null 2>/dev/null
selfserv with PID 6697 found at Tue Nov 27 18:57:08 EST 2012
selfserv with PID 6697 started at Tue Nov 27 18:57:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1059: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6697 at Tue Nov 27 18:57:08 EST 2012
kill -USR1 6697
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6697 killed at Tue Nov 27 18:57:08 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6753 >/dev/null 2>/dev/null
selfserv with PID 6753 found at Tue Nov 27 18:57:08 EST 2012
selfserv with PID 6753 started at Tue Nov 27 18:57:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1060: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6753 at Tue Nov 27 18:57:08 EST 2012
kill -USR1 6753
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6753 killed at Tue Nov 27 18:57:08 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6809 >/dev/null 2>/dev/null
selfserv with PID 6809 found at Tue Nov 27 18:57:08 EST 2012
selfserv with PID 6809 started at Tue Nov 27 18:57:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1061: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6809 at Tue Nov 27 18:57:08 EST 2012
kill -USR1 6809
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6809 killed at Tue Nov 27 18:57:08 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6877 >/dev/null 2>/dev/null
selfserv with PID 6877 found at Tue Nov 27 18:57:08 EST 2012
selfserv with PID 6877 started at Tue Nov 27 18:57:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1062: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6877 at Tue Nov 27 18:57:09 EST 2012
kill -USR1 6877
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6877 killed at Tue Nov 27 18:57:09 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6933 >/dev/null 2>/dev/null
selfserv with PID 6933 found at Tue Nov 27 18:57:09 EST 2012
selfserv with PID 6933 started at Tue Nov 27 18:57:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1063: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6933 at Tue Nov 27 18:57:09 EST 2012
kill -USR1 6933
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6933 killed at Tue Nov 27 18:57:09 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6989 >/dev/null 2>/dev/null
selfserv with PID 6989 found at Tue Nov 27 18:57:09 EST 2012
selfserv with PID 6989 started at Tue Nov 27 18:57:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1064: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6989 at Tue Nov 27 18:57:09 EST 2012
kill -USR1 6989
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6989 killed at Tue Nov 27 18:57:09 EST 2012
ssl.sh: Cache CRL SSL Client Tests - with ECC ===============================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/authin.tl.tmp
0
selfserv starting at Tue Nov 27 18:57:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:09 EST 2012
selfserv with PID 7052 started at Tue Nov 27 18:57:09 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:09 EST 2012
ssl.sh: #1065: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:09 EST 2012
ssl.sh: #1066: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:09 EST 2012
ssl.sh: #1067: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser43 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1068: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser44 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1069: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser45 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1070: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser46 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1071: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser47 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1072: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser48 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1073: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser49 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1074: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser50 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1075: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser51 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1076: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser52 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1077: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
================= CRL Reloaded =============
ssl.sh: #1078: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1079: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1080: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1081: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser43 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1082: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser44 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1083: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser45 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1084: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser46 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1085: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser47 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1086: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser48 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1087: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser49 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1088: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser50 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1089: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser51 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1090: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser52 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1091: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
================= CRL Reloaded =============
ssl.sh: #1092: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1093: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1094: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1095: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser43 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1096: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser44 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1097: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser45 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1098: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser46 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1099: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser47 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1100: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser48 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1101: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser49 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1102: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser50 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1103: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser51 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1104: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser52 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1105: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 7052 at Tue Nov 27 18:57:13 EST 2012
kill -USR1 7052
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7052 killed at Tue Nov 27 18:57:13 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:57:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
selfserv with PID 8472 started at Tue Nov 27 18:57:13 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1106: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1107: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1108: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser43 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1109: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser44 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1110: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser45 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1111: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser46 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1112: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser47 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1113: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser48 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1114: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser49 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1115: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser50 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1116: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser51 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1117: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser52 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1118: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
================= CRL Reloaded =============
ssl.sh: #1119: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1120: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1121: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1122: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser43 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1123: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser44 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1124: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser45 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1125: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser46 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1126: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser47 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1127: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser48 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1128: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser49 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1129: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser50 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1130: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser51 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1131: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser52 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1132: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
================= CRL Reloaded =============
ssl.sh: #1133: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1134: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1135: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1136: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser43 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1137: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser44 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1138: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser45 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1139: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser46 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1140: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser47 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1141: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser48 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1142: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser49 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1143: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser50 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1144: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser51 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1145: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser52 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1146: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 8472 at Tue Nov 27 18:57:16 EST 2012
kill -USR1 8472
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8472 killed at Tue Nov 27 18:57:16 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:57:16 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:16 EST 2012
selfserv with PID 9892 started at Tue Nov 27 18:57:16 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1147: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1148: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1149: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser43-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1150: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser44-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1151: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser45-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1152: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser46-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1153: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser47-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1154: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser48-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1155: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser49-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1156: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser50-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
ssl.sh: #1157: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser51-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
ssl.sh: #1158: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser52-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
ssl.sh: #1159: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
================= CRL Reloaded =============
ssl.sh: #1160: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
ssl.sh: #1161: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
ssl.sh: #1162: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
ssl.sh: #1163: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser43-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
ssl.sh: #1164: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser44-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
ssl.sh: #1165: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser45-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
ssl.sh: #1166: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser46-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
ssl.sh: #1167: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser47-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
ssl.sh: #1168: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser48-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
ssl.sh: #1169: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser49-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
ssl.sh: #1170: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser50-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
ssl.sh: #1171: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser51-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
ssl.sh: #1172: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser52-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
ssl.sh: #1173: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
================= CRL Reloaded =============
ssl.sh: #1174: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1175: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1176: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1177: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser43-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1178: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser44-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1179: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser45-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1180: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser46-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1181: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser47-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1182: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser48-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1183: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser49-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1184: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser50-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:21 EST 2012
ssl.sh: #1185: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser51-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:21 EST 2012
ssl.sh: #1186: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser52-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:21 EST 2012
ssl.sh: #1187: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 9892 at Tue Nov 27 18:57:21 EST 2012
kill -USR1 9892
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9892 killed at Tue Nov 27 18:57:21 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:21 EST 2012
selfserv with PID 11314 started at Tue Nov 27 18:57:21 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:21 EST 2012
ssl.sh: #1188: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:21 EST 2012
ssl.sh: #1189: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:21 EST 2012
ssl.sh: #1190: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser43-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:21 EST 2012
ssl.sh: #1191: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser44-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:21 EST 2012
ssl.sh: #1192: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser45-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
ssl.sh: #1193: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser46-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
ssl.sh: #1194: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser47-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
ssl.sh: #1195: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser48-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
ssl.sh: #1196: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser49-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
ssl.sh: #1197: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser50-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
ssl.sh: #1198: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser51-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
ssl.sh: #1199: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser52-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
ssl.sh: #1200: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
================= CRL Reloaded =============
ssl.sh: #1201: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1202: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1203: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1204: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser43-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1205: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser44-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1206: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser45-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1207: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser46-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1208: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser47-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1209: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser48-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1210: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser49-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
ssl.sh: #1211: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser50-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
ssl.sh: #1212: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser51-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
ssl.sh: #1213: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser52-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
ssl.sh: #1214: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
================= CRL Reloaded =============
ssl.sh: #1215: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
ssl.sh: #1216: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
ssl.sh: #1217: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
ssl.sh: #1218: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser43-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
ssl.sh: #1219: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser44-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1220: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser45-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1221: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser46-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1222: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser47-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1223: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser48-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1224: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser49-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1225: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser50-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1226: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser51-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1227: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser52-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1228: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 11314 at Tue Nov 27 18:57:25 EST 2012
kill -USR1 11314
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11314 killed at Tue Nov 27 18:57:25 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12743 >/dev/null 2>/dev/null
selfserv with PID 12743 found at Tue Nov 27 18:57:25 EST 2012
selfserv with PID 12743 started at Tue Nov 27 18:57:25 EST 2012
trying to kill selfserv with PID 12743 at Tue Nov 27 18:57:25 EST 2012
kill -USR1 12743
./ssl.sh: line 173: 12743 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12743 killed at Tue Nov 27 18:57:25 EST 2012
selfserv starting at Tue Nov 27 18:57:26 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
selfserv with PID 12785 started at Tue Nov 27 18:57:26 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1229: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1230: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1231: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser43 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1232: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser44 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1233: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser45 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1234: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser46 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1235: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser47 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1236: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser48 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1237: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser49 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1238: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser50 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1239: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser51 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1240: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser52 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1241: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
================= CRL Reloaded =============
ssl.sh: #1242: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1243: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1244: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1245: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser43 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1246: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser44 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1247: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser45 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1248: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser46 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1249: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser47 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1250: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser48 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1251: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser49 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1252: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser50 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1253: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser51 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1254: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser52 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1255: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
================= CRL Reloaded =============
ssl.sh: #1256: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1259: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser43 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1260: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser44 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1261: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser45 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1262: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser46 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1263: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser47 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1264: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser48 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1265: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser49 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1266: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser50 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1267: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser51 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1268: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser52 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1269: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12785 at Tue Nov 27 18:57:29 EST 2012
kill -USR1 12785
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12785 killed at Tue Nov 27 18:57:29 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:57:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:29 EST 2012
selfserv with PID 14205 started at Tue Nov 27 18:57:29 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1270: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1271: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1272: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1273: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1274: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1275: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1276: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1277: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1278: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1279: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1280: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1281: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1282: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
================= CRL Reloaded =============
ssl.sh: #1283: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1284: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1285: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1286: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1287: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1288: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1289: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1290: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1291: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1294: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1295: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1296: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
================= CRL Reloaded =============
ssl.sh: #1297: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1298: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1299: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1300: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1301: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1302: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1303: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1304: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1305: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1306: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1307: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1308: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1309: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1310: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14205 at Tue Nov 27 18:57:33 EST 2012
kill -USR1 14205
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14205 killed at Tue Nov 27 18:57:33 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:57:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:33 EST 2012
selfserv with PID 15627 started at Tue Nov 27 18:57:33 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1311: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1312: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1313: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1314: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1315: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1316: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1317: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1318: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1319: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1320: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1321: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1322: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1323: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
================= CRL Reloaded =============
ssl.sh: #1324: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1325: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1326: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1327: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1328: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1329: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1330: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1331: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1332: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1333: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1334: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1335: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1336: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1337: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
================= CRL Reloaded =============
ssl.sh: #1338: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1339: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1340: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1341: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1342: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1343: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1344: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1345: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1346: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1347: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1348: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1349: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1350: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1351: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15627 at Tue Nov 27 18:57:37 EST 2012
kill -USR1 15627
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15627 killed at Tue Nov 27 18:57:37 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:57:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:37 EST 2012
selfserv with PID 17047 started at Tue Nov 27 18:57:37 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1352: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1353: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1354: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser43-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:38 EST 2012
ssl.sh: #1355: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser44-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:38 EST 2012
ssl.sh: #1356: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser45-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:38 EST 2012
ssl.sh: #1357: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser46-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:38 EST 2012
ssl.sh: #1358: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser47-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:38 EST 2012
ssl.sh: #1359: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser48-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:38 EST 2012
ssl.sh: #1360: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser49-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:38 EST 2012
ssl.sh: #1361: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser50-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1362: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser51-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1363: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser52-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1364: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
================= CRL Reloaded =============
ssl.sh: #1365: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1366: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1367: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1368: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser43-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1369: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser44-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1370: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser45-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1371: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser46-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
ssl.sh: #1372: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser47-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
ssl.sh: #1373: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser48-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
ssl.sh: #1374: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser49-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
ssl.sh: #1375: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser50-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
ssl.sh: #1376: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser51-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
ssl.sh: #1377: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser52-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
ssl.sh: #1378: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
================= CRL Reloaded =============
ssl.sh: #1379: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
ssl.sh: #1380: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1381: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1382: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser43-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1383: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser44-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1384: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser45-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1385: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser46-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1386: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser47-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1387: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser48-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1388: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser49-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1389: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser50-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:42 EST 2012
ssl.sh: #1390: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser51-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:42 EST 2012
ssl.sh: #1391: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser52-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:42 EST 2012
ssl.sh: #1392: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17047 at Tue Nov 27 18:57:42 EST 2012
kill -USR1 17047
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17047 killed at Tue Nov 27 18:57:42 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:42 EST 2012
selfserv with PID 18469 started at Tue Nov 27 18:57:42 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:42 EST 2012
ssl.sh: #1393: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:42 EST 2012
ssl.sh: #1394: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:42 EST 2012
ssl.sh: #1395: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:42 EST 2012
ssl.sh: #1396: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:42 EST 2012
ssl.sh: #1397: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:43 EST 2012
ssl.sh: #1398: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:43 EST 2012
ssl.sh: #1399: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:43 EST 2012
ssl.sh: #1400: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:43 EST 2012
ssl.sh: #1401: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:43 EST 2012
ssl.sh: #1402: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:43 EST 2012
ssl.sh: #1403: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:43 EST 2012
ssl.sh: #1404: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:43 EST 2012
ssl.sh: #1405: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:44 EST 2012
================= CRL Reloaded =============
ssl.sh: #1406: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:44 EST 2012
ssl.sh: #1407: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:44 EST 2012
ssl.sh: #1408: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:44 EST 2012
ssl.sh: #1409: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:44 EST 2012
ssl.sh: #1410: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:44 EST 2012
ssl.sh: #1411: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:44 EST 2012
ssl.sh: #1412: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:44 EST 2012
ssl.sh: #1413: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:45 EST 2012
ssl.sh: #1414: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:45 EST 2012
ssl.sh: #1415: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:45 EST 2012
ssl.sh: #1416: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:45 EST 2012
ssl.sh: #1417: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:45 EST 2012
ssl.sh: #1418: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:45 EST 2012
ssl.sh: #1419: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:45 EST 2012
================= CRL Reloaded =============
ssl.sh: #1420: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:45 EST 2012
ssl.sh: #1421: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1422: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1423: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1424: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1425: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1426: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1427: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1428: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1429: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1430: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1431: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:47 EST 2012
ssl.sh: #1432: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:47 EST 2012
ssl.sh: #1433: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18469 at Tue Nov 27 18:57:47 EST 2012
kill -USR1 18469
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18469 killed at Tue Nov 27 18:57:47 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:47 EST 2012
selfserv with PID 19889 started at Tue Nov 27 18:57:47 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:47 EST 2012
ssl.sh: #1434: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:47 EST 2012
ssl.sh: #1435: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:47 EST 2012
ssl.sh: #1436: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:47 EST 2012
ssl.sh: #1437: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:47 EST 2012
ssl.sh: #1438: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:47 EST 2012
ssl.sh: #1439: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:48 EST 2012
ssl.sh: #1440: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:48 EST 2012
ssl.sh: #1441: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:48 EST 2012
ssl.sh: #1442: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:48 EST 2012
ssl.sh: #1443: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:48 EST 2012
ssl.sh: #1444: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:48 EST 2012
ssl.sh: #1445: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:48 EST 2012
ssl.sh: #1446: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:48 EST 2012
================= CRL Reloaded =============
ssl.sh: #1447: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1448: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1449: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1450: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1451: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1452: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1453: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1454: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1455: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1456: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
ssl.sh: #1457: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
ssl.sh: #1458: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
ssl.sh: #1459: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
ssl.sh: #1460: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
================= CRL Reloaded =============
ssl.sh: #1461: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
ssl.sh: #1462: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
ssl.sh: #1463: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
ssl.sh: #1464: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
ssl.sh: #1465: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1466: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1467: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1468: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1469: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1470: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1471: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1472: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1473: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1474: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19889 at Tue Nov 27 18:57:51 EST 2012
kill -USR1 19889
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19889 killed at Tue Nov 27 18:57:52 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21310 >/dev/null 2>/dev/null
selfserv with PID 21310 found at Tue Nov 27 18:57:52 EST 2012
selfserv with PID 21310 started at Tue Nov 27 18:57:52 EST 2012
trying to kill selfserv with PID 21310 at Tue Nov 27 18:57:52 EST 2012
kill -USR1 21310
./ssl.sh: line 173: 21310 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21310 killed at Tue Nov 27 18:57:52 EST 2012
selfserv starting at Tue Nov 27 18:57:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
selfserv with PID 21352 started at Tue Nov 27 18:57:52 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1475: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1476: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1477: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser43 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1478: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser44 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1479: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser45 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1480: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser46 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1481: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser47 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1482: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser48 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1483: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser49 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1484: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser50 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1485: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser51 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1486: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser52 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1487: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
================= CRL Reloaded =============
ssl.sh: #1488: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1489: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1490: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1491: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser43 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1492: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser44 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1493: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser45 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1494: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser46 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1495: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser47 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1496: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser48 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1497: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser49 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1498: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser50 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1499: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser51 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1500: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser52 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1501: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
================= CRL Reloaded =============
ssl.sh: #1502: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1503: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1504: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1505: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser43 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1506: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser44 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1507: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser45 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1508: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser46 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1509: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser47 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1510: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser48 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1511: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser49 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1512: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser50 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1513: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser51 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1514: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser52 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1515: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21352 at Tue Nov 27 18:57:56 EST 2012
kill -USR1 21352
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21352 killed at Tue Nov 27 18:57:56 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:57:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
selfserv with PID 22772 started at Tue Nov 27 18:57:56 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1516: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1517: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1518: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1519: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1520: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1521: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1522: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1523: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1524: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1525: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1526: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1527: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1528: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
================= CRL Reloaded =============
ssl.sh: #1529: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1530: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1531: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1532: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1533: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1534: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1535: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1536: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1537: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1538: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1539: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1540: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1541: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1542: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
================= CRL Reloaded =============
ssl.sh: #1543: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1544: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1545: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1546: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1547: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1548: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1549: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1550: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1551: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1552: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1553: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1554: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1555: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1556: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22772 at Tue Nov 27 18:57:59 EST 2012
kill -USR1 22772
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22772 killed at Tue Nov 27 18:57:59 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:57:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:57:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:57:59 EST 2012
selfserv with PID 24192 started at Tue Nov 27 18:57:59 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1557: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1558: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1559: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1560: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1561: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1562: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1563: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1564: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1565: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1566: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1567: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1569: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
================= CRL Reloaded =============
ssl.sh: #1570: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1571: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1572: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1573: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1574: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1575: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1576: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1577: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1578: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1579: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1580: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1581: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1582: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1583: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
================= CRL Reloaded =============
ssl.sh: #1584: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1585: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1586: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1587: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1588: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1589: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1590: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1591: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:03 EST 2012
ssl.sh: #1592: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:03 EST 2012
ssl.sh: #1593: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:03 EST 2012
ssl.sh: #1594: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:03 EST 2012
ssl.sh: #1595: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:03 EST 2012
ssl.sh: #1596: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:03 EST 2012
ssl.sh: #1597: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24192 at Tue Nov 27 18:58:03 EST 2012
kill -USR1 24192
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24192 killed at Tue Nov 27 18:58:03 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:58:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:03 EST 2012
selfserv with PID 25622 started at Tue Nov 27 18:58:03 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:03 EST 2012
ssl.sh: #1598: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:03 EST 2012
ssl.sh: #1599: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:04 EST 2012
ssl.sh: #1600: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser43-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:04 EST 2012
ssl.sh: #1601: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser44-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:04 EST 2012
ssl.sh: #1602: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser45-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:04 EST 2012
ssl.sh: #1603: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser46-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:04 EST 2012
ssl.sh: #1604: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser47-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:04 EST 2012
ssl.sh: #1605: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser48-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:04 EST 2012
ssl.sh: #1606: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser49-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:04 EST 2012
ssl.sh: #1607: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser50-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
ssl.sh: #1608: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser51-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
ssl.sh: #1609: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser52-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
ssl.sh: #1610: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
================= CRL Reloaded =============
ssl.sh: #1611: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
ssl.sh: #1612: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
ssl.sh: #1613: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
ssl.sh: #1614: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser43-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
ssl.sh: #1615: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser44-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
ssl.sh: #1616: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser45-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
ssl.sh: #1617: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser46-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
ssl.sh: #1618: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser47-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
ssl.sh: #1619: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser48-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
ssl.sh: #1620: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser49-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
ssl.sh: #1621: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser50-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
ssl.sh: #1622: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser51-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
ssl.sh: #1623: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser52-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
ssl.sh: #1624: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
================= CRL Reloaded =============
ssl.sh: #1625: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1626: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1627: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1628: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser43-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1629: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser44-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1630: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser45-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1631: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser46-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1632: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser47-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1633: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser48-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1634: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser49-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:08 EST 2012
ssl.sh: #1635: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser50-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:08 EST 2012
ssl.sh: #1636: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser51-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:08 EST 2012
ssl.sh: #1637: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser52-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:08 EST 2012
ssl.sh: #1638: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25622 at Tue Nov 27 18:58:08 EST 2012
kill -USR1 25622
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25622 killed at Tue Nov 27 18:58:08 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:08 EST 2012
selfserv with PID 27042 started at Tue Nov 27 18:58:08 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:08 EST 2012
ssl.sh: #1639: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:08 EST 2012
ssl.sh: #1640: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:08 EST 2012
ssl.sh: #1641: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:09 EST 2012
ssl.sh: #1642: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:09 EST 2012
ssl.sh: #1643: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:09 EST 2012
ssl.sh: #1644: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:09 EST 2012
ssl.sh: #1645: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:09 EST 2012
ssl.sh: #1646: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:09 EST 2012
ssl.sh: #1647: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:09 EST 2012
ssl.sh: #1648: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:09 EST 2012
ssl.sh: #1649: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
ssl.sh: #1650: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
ssl.sh: #1651: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
================= CRL Reloaded =============
ssl.sh: #1652: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
ssl.sh: #1653: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
ssl.sh: #1654: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
ssl.sh: #1655: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
ssl.sh: #1656: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
ssl.sh: #1657: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
ssl.sh: #1658: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
ssl.sh: #1659: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
ssl.sh: #1660: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
ssl.sh: #1661: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
ssl.sh: #1662: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
ssl.sh: #1663: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
ssl.sh: #1664: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
ssl.sh: #1665: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
================= CRL Reloaded =============
ssl.sh: #1666: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
ssl.sh: #1667: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1668: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1669: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1670: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1671: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1672: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1673: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1674: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1675: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1676: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1677: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:13 EST 2012
ssl.sh: #1678: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:13 EST 2012
ssl.sh: #1679: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27042 at Tue Nov 27 18:58:13 EST 2012
kill -USR1 27042
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27042 killed at Tue Nov 27 18:58:13 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:13 EST 2012
selfserv with PID 28463 started at Tue Nov 27 18:58:13 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:13 EST 2012
ssl.sh: #1680: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:13 EST 2012
ssl.sh: #1681: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:13 EST 2012
ssl.sh: #1682: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:13 EST 2012
ssl.sh: #1683: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:13 EST 2012
ssl.sh: #1684: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:14 EST 2012
ssl.sh: #1685: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:14 EST 2012
ssl.sh: #1686: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:14 EST 2012
ssl.sh: #1687: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:14 EST 2012
ssl.sh: #1688: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:14 EST 2012
ssl.sh: #1689: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:14 EST 2012
ssl.sh: #1690: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:14 EST 2012
ssl.sh: #1691: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:14 EST 2012
ssl.sh: #1692: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
================= CRL Reloaded =============
ssl.sh: #1693: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
ssl.sh: #1694: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
ssl.sh: #1695: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
ssl.sh: #1696: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
ssl.sh: #1697: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
ssl.sh: #1698: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
ssl.sh: #1699: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
ssl.sh: #1700: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
ssl.sh: #1701: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1702: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1703: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1704: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1705: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1706: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec
RELOAD time
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
================= CRL Reloaded =============
ssl.sh: #1707: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1708: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1709: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1710: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1711: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:17 EST 2012
ssl.sh: #1712: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:17 EST 2012
ssl.sh: #1713: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:17 EST 2012
ssl.sh: #1714: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:17 EST 2012
ssl.sh: #1715: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:17 EST 2012
ssl.sh: #1716: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:17 EST 2012
ssl.sh: #1717: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:17 EST 2012
ssl.sh: #1718: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:17 EST 2012
ssl.sh: #1719: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:18 EST 2012
ssl.sh: #1720: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28463 at Tue Nov 27 18:58:18 EST 2012
kill -USR1 28463
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28463 killed at Tue Nov 27 18:58:18 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29884 >/dev/null 2>/dev/null
selfserv with PID 29884 found at Tue Nov 27 18:58:18 EST 2012
selfserv with PID 29884 started at Tue Nov 27 18:58:18 EST 2012
trying to kill selfserv with PID 29884 at Tue Nov 27 18:58:18 EST 2012
kill -USR1 29884
./ssl.sh: line 173: 29884 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29884 killed at Tue Nov 27 18:58:18 EST 2012
ssl.sh: SSL Cipher Coverage - server bypass/client normal - with ECC ===============================
selfserv starting at Tue Nov 27 18:58:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
selfserv with PID 29932 started at Tue Nov 27 18:58:18 EST 2012
ssl.sh: running SSL2_RC4_128_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c A -V ssl2:ssl3 -O \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1721: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c B -V ssl2:ssl3 -O \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1722: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c C -V ssl2:ssl3 -O \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1723: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c D -V ssl2:ssl3 -O \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1724: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c E -V ssl2:ssl3 -O \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1725: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c F -V ssl2:ssl3 -O \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1726: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c B -V ssl2:tls1.1 -O \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1727: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c C -V ssl2:tls1.1 -O \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1728: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c E -V ssl2:tls1.1 -O \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1729: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1730: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1731: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1732: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1733: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1734: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1735: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1736: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1737: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1738: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1739: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1740: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1741: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1742: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1743: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1744: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1745: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1746: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1747: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1748: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1749: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1750: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1751: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1752: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1753: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1754: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1755: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1756: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1757: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1758: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1759: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1760: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1761: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1762: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1763: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1764: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1765: TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1766: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1767: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1768: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1769: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1770: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1771: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1772: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1773: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1774: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1775: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1776: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1777: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1778: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1779: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 29932 at Tue Nov 27 18:58:22 EST 2012
kill -USR1 29932
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29932 killed at Tue Nov 27 18:58:22 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:58:22 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31523 >/dev/null 2>/dev/null
selfserv with PID 31523 found at Tue Nov 27 18:58:22 EST 2012
selfserv with PID 31523 started at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1780: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31523 >/dev/null 2>/dev/null
selfserv with PID 31523 found at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1781: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31523 >/dev/null 2>/dev/null
selfserv with PID 31523 found at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1782: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31523 >/dev/null 2>/dev/null
selfserv with PID 31523 found at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1783: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31523 >/dev/null 2>/dev/null
selfserv with PID 31523 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1784: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31523 at Tue Nov 27 18:58:23 EST 2012
kill -USR1 31523
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31523 killed at Tue Nov 27 18:58:23 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:58:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
selfserv with PID 31671 started at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1785: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1786: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1787: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1788: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1789: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1790: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1791: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1792: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1793: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1794: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1795: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1796: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1797: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1798: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1799: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31671 at Tue Nov 27 18:58:24 EST 2012
kill -USR1 31671
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31671 killed at Tue Nov 27 18:58:24 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:58:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32070 >/dev/null 2>/dev/null
selfserv with PID 32070 found at Tue Nov 27 18:58:24 EST 2012
selfserv with PID 32070 started at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1800: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32070 >/dev/null 2>/dev/null
selfserv with PID 32070 found at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1801: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32070 >/dev/null 2>/dev/null
selfserv with PID 32070 found at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1802: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32070 >/dev/null 2>/dev/null
selfserv with PID 32070 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1803: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32070 >/dev/null 2>/dev/null
selfserv with PID 32070 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1804: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32070 at Tue Nov 27 18:58:25 EST 2012
kill -USR1 32070
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32070 killed at Tue Nov 27 18:58:25 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:58:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
selfserv with PID 32218 started at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1805: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1806: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1807: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1808: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1809: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1810: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1811: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1812: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1813: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1814: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1815: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1816: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1817: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1818: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1819: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32218 at Tue Nov 27 18:58:26 EST 2012
kill -USR1 32218
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32218 killed at Tue Nov 27 18:58:26 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:58:26 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32604 >/dev/null 2>/dev/null
selfserv with PID 32604 found at Tue Nov 27 18:58:26 EST 2012
selfserv with PID 32604 started at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1820: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32604 >/dev/null 2>/dev/null
selfserv with PID 32604 found at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1821: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32604 >/dev/null 2>/dev/null
selfserv with PID 32604 found at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1822: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32604 >/dev/null 2>/dev/null
selfserv with PID 32604 found at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1823: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32604 >/dev/null 2>/dev/null
selfserv with PID 32604 found at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1824: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32604 at Tue Nov 27 18:58:27 EST 2012
kill -USR1 32604
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32604 killed at Tue Nov 27 18:58:27 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:58:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32752 >/dev/null 2>/dev/null
selfserv with PID 32752 found at Tue Nov 27 18:58:27 EST 2012
selfserv with PID 32752 started at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1825: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32752 >/dev/null 2>/dev/null
selfserv with PID 32752 found at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1826: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32752 >/dev/null 2>/dev/null
selfserv with PID 32752 found at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1827: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32752 >/dev/null 2>/dev/null
selfserv with PID 32752 found at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1828: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32752 >/dev/null 2>/dev/null
selfserv with PID 32752 found at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1829: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32752 at Tue Nov 27 18:58:27 EST 2012
kill -USR1 32752
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32752 killed at Tue Nov 27 18:58:27 EST 2012
ssl.sh: SSL Client Authentication - server bypass/client normal - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 499 >/dev/null 2>/dev/null
selfserv with PID 499 found at Tue Nov 27 18:58:27 EST 2012
selfserv with PID 499 started at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1830: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 499 at Tue Nov 27 18:58:27 EST 2012
kill -USR1 499
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 499 killed at Tue Nov 27 18:58:27 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:58:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 571 >/dev/null 2>/dev/null
selfserv with PID 571 found at Tue Nov 27 18:58:28 EST 2012
selfserv with PID 571 started at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1831: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 571 at Tue Nov 27 18:58:28 EST 2012
kill -USR1 571
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 571 killed at Tue Nov 27 18:58:28 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:58:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 640 >/dev/null 2>/dev/null
selfserv with PID 640 found at Tue Nov 27 18:58:28 EST 2012
selfserv with PID 640 started at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1832: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 640 at Tue Nov 27 18:58:28 EST 2012
kill -USR1 640
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 640 killed at Tue Nov 27 18:58:28 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 710 >/dev/null 2>/dev/null
selfserv with PID 710 found at Tue Nov 27 18:58:28 EST 2012
selfserv with PID 710 started at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1833: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 710 at Tue Nov 27 18:58:28 EST 2012
kill -USR1 710
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 710 killed at Tue Nov 27 18:58:28 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:58:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 768 >/dev/null 2>/dev/null
selfserv with PID 768 found at Tue Nov 27 18:58:28 EST 2012
selfserv with PID 768 started at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1834: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 768 at Tue Nov 27 18:58:28 EST 2012
kill -USR1 768
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 768 killed at Tue Nov 27 18:58:28 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:58:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 834 >/dev/null 2>/dev/null
selfserv with PID 834 found at Tue Nov 27 18:58:28 EST 2012
selfserv with PID 834 started at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1835: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 834 at Tue Nov 27 18:58:29 EST 2012
kill -USR1 834
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 834 killed at Tue Nov 27 18:58:29 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 908 >/dev/null 2>/dev/null
selfserv with PID 908 found at Tue Nov 27 18:58:29 EST 2012
selfserv with PID 908 started at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1836: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 908 at Tue Nov 27 18:58:29 EST 2012
kill -USR1 908
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 908 killed at Tue Nov 27 18:58:29 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:58:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 996 >/dev/null 2>/dev/null
selfserv with PID 996 found at Tue Nov 27 18:58:29 EST 2012
selfserv with PID 996 started at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1837: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 996 at Tue Nov 27 18:58:29 EST 2012
kill -USR1 996
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 996 killed at Tue Nov 27 18:58:29 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:58:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1053 >/dev/null 2>/dev/null
selfserv with PID 1053 found at Tue Nov 27 18:58:29 EST 2012
selfserv with PID 1053 started at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1838: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1053 at Tue Nov 27 18:58:29 EST 2012
kill -USR1 1053
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1053 killed at Tue Nov 27 18:58:29 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1110 >/dev/null 2>/dev/null
selfserv with PID 1110 found at Tue Nov 27 18:58:29 EST 2012
selfserv with PID 1110 started at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1839: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1110 at Tue Nov 27 18:58:29 EST 2012
kill -USR1 1110
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1110 killed at Tue Nov 27 18:58:29 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:58:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1167 >/dev/null 2>/dev/null
selfserv with PID 1167 found at Tue Nov 27 18:58:29 EST 2012
selfserv with PID 1167 started at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1840: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1167 at Tue Nov 27 18:58:30 EST 2012
kill -USR1 1167
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1167 killed at Tue Nov 27 18:58:30 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:58:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1224 >/dev/null 2>/dev/null
selfserv with PID 1224 found at Tue Nov 27 18:58:30 EST 2012
selfserv with PID 1224 started at Tue Nov 27 18:58:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1841: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1224 at Tue Nov 27 18:58:30 EST 2012
kill -USR1 1224
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1224 killed at Tue Nov 27 18:58:30 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1281 >/dev/null 2>/dev/null
selfserv with PID 1281 found at Tue Nov 27 18:58:30 EST 2012
selfserv with PID 1281 started at Tue Nov 27 18:58:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1842: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1281 at Tue Nov 27 18:58:30 EST 2012
kill -USR1 1281
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1281 killed at Tue Nov 27 18:58:30 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:58:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1338 >/dev/null 2>/dev/null
selfserv with PID 1338 found at Tue Nov 27 18:58:30 EST 2012
selfserv with PID 1338 started at Tue Nov 27 18:58:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1843: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1338 at Tue Nov 27 18:58:30 EST 2012
kill -USR1 1338
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1338 killed at Tue Nov 27 18:58:30 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:58:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1395 >/dev/null 2>/dev/null
selfserv with PID 1395 found at Tue Nov 27 18:58:30 EST 2012
selfserv with PID 1395 started at Tue Nov 27 18:58:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1844: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1395 at Tue Nov 27 18:58:30 EST 2012
kill -USR1 1395
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1395 killed at Tue Nov 27 18:58:30 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1452 >/dev/null 2>/dev/null
selfserv with PID 1452 found at Tue Nov 27 18:58:31 EST 2012
selfserv with PID 1452 started at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1845: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1452 at Tue Nov 27 18:58:31 EST 2012
kill -USR1 1452
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1452 killed at Tue Nov 27 18:58:31 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:58:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1510 >/dev/null 2>/dev/null
selfserv with PID 1510 found at Tue Nov 27 18:58:31 EST 2012
selfserv with PID 1510 started at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1846: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1510 at Tue Nov 27 18:58:31 EST 2012
kill -USR1 1510
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1510 killed at Tue Nov 27 18:58:31 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:58:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1567 >/dev/null 2>/dev/null
selfserv with PID 1567 found at Tue Nov 27 18:58:31 EST 2012
selfserv with PID 1567 started at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1847: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1567 at Tue Nov 27 18:58:31 EST 2012
kill -USR1 1567
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1567 killed at Tue Nov 27 18:58:31 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1624 >/dev/null 2>/dev/null
selfserv with PID 1624 found at Tue Nov 27 18:58:31 EST 2012
selfserv with PID 1624 started at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1848: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1624 at Tue Nov 27 18:58:31 EST 2012
kill -USR1 1624
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1624 killed at Tue Nov 27 18:58:31 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:58:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1681 >/dev/null 2>/dev/null
selfserv with PID 1681 found at Tue Nov 27 18:58:31 EST 2012
selfserv with PID 1681 started at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1849: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1681 at Tue Nov 27 18:58:32 EST 2012
kill -USR1 1681
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1681 killed at Tue Nov 27 18:58:32 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:58:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1738 >/dev/null 2>/dev/null
selfserv with PID 1738 found at Tue Nov 27 18:58:32 EST 2012
selfserv with PID 1738 started at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1850: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1738 at Tue Nov 27 18:58:32 EST 2012
kill -USR1 1738
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1738 killed at Tue Nov 27 18:58:32 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1795 >/dev/null 2>/dev/null
selfserv with PID 1795 found at Tue Nov 27 18:58:32 EST 2012
selfserv with PID 1795 started at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1851: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1795 at Tue Nov 27 18:58:32 EST 2012
kill -USR1 1795
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1795 killed at Tue Nov 27 18:58:32 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:58:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1852 >/dev/null 2>/dev/null
selfserv with PID 1852 found at Tue Nov 27 18:58:32 EST 2012
selfserv with PID 1852 started at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1852: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1852 at Tue Nov 27 18:58:32 EST 2012
kill -USR1 1852
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1852 killed at Tue Nov 27 18:58:32 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:58:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1909 >/dev/null 2>/dev/null
selfserv with PID 1909 found at Tue Nov 27 18:58:32 EST 2012
selfserv with PID 1909 started at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1853: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1909 at Tue Nov 27 18:58:32 EST 2012
kill -USR1 1909
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1909 killed at Tue Nov 27 18:58:32 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1966 >/dev/null 2>/dev/null
selfserv with PID 1966 found at Tue Nov 27 18:58:32 EST 2012
selfserv with PID 1966 started at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1854: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1966 at Tue Nov 27 18:58:33 EST 2012
kill -USR1 1966
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1966 killed at Tue Nov 27 18:58:33 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:58:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2023 >/dev/null 2>/dev/null
selfserv with PID 2023 found at Tue Nov 27 18:58:33 EST 2012
selfserv with PID 2023 started at Tue Nov 27 18:58:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1855: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2023 at Tue Nov 27 18:58:33 EST 2012
kill -USR1 2023
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2023 killed at Tue Nov 27 18:58:33 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:58:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2080 >/dev/null 2>/dev/null
selfserv with PID 2080 found at Tue Nov 27 18:58:33 EST 2012
selfserv with PID 2080 started at Tue Nov 27 18:58:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1856: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2080 at Tue Nov 27 18:58:33 EST 2012
kill -USR1 2080
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2080 killed at Tue Nov 27 18:58:33 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2137 >/dev/null 2>/dev/null
selfserv with PID 2137 found at Tue Nov 27 18:58:33 EST 2012
selfserv with PID 2137 started at Tue Nov 27 18:58:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1857: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2137 at Tue Nov 27 18:58:33 EST 2012
kill -USR1 2137
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2137 killed at Tue Nov 27 18:58:33 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:58:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2195 >/dev/null 2>/dev/null
selfserv with PID 2195 found at Tue Nov 27 18:58:33 EST 2012
selfserv with PID 2195 started at Tue Nov 27 18:58:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1858: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2195 at Tue Nov 27 18:58:33 EST 2012
kill -USR1 2195
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2195 killed at Tue Nov 27 18:58:33 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:58:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2252 >/dev/null 2>/dev/null
selfserv with PID 2252 found at Tue Nov 27 18:58:34 EST 2012
selfserv with PID 2252 started at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1859: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2252 at Tue Nov 27 18:58:34 EST 2012
kill -USR1 2252
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2252 killed at Tue Nov 27 18:58:34 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2324 >/dev/null 2>/dev/null
selfserv with PID 2324 found at Tue Nov 27 18:58:34 EST 2012
selfserv with PID 2324 started at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1860: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2324 at Tue Nov 27 18:58:34 EST 2012
kill -USR1 2324
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2324 killed at Tue Nov 27 18:58:34 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2381 >/dev/null 2>/dev/null
selfserv with PID 2381 found at Tue Nov 27 18:58:34 EST 2012
selfserv with PID 2381 started at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1861: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2381 at Tue Nov 27 18:58:34 EST 2012
kill -USR1 2381
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2381 killed at Tue Nov 27 18:58:34 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2438 >/dev/null 2>/dev/null
selfserv with PID 2438 found at Tue Nov 27 18:58:34 EST 2012
selfserv with PID 2438 started at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1862: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2438 at Tue Nov 27 18:58:34 EST 2012
kill -USR1 2438
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2438 killed at Tue Nov 27 18:58:34 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2495 >/dev/null 2>/dev/null
selfserv with PID 2495 found at Tue Nov 27 18:58:34 EST 2012
selfserv with PID 2495 started at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1863: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2495 at Tue Nov 27 18:58:35 EST 2012
kill -USR1 2495
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2495 killed at Tue Nov 27 18:58:35 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2552 >/dev/null 2>/dev/null
selfserv with PID 2552 found at Tue Nov 27 18:58:35 EST 2012
selfserv with PID 2552 started at Tue Nov 27 18:58:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1864: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2552 at Tue Nov 27 18:58:35 EST 2012
kill -USR1 2552
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2552 killed at Tue Nov 27 18:58:35 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2609 >/dev/null 2>/dev/null
selfserv with PID 2609 found at Tue Nov 27 18:58:35 EST 2012
selfserv with PID 2609 started at Tue Nov 27 18:58:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1865: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2609 at Tue Nov 27 18:58:35 EST 2012
kill -USR1 2609
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2609 killed at Tue Nov 27 18:58:35 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2666 >/dev/null 2>/dev/null
selfserv with PID 2666 found at Tue Nov 27 18:58:35 EST 2012
selfserv with PID 2666 started at Tue Nov 27 18:58:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1866: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2666 at Tue Nov 27 18:58:35 EST 2012
kill -USR1 2666
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2666 killed at Tue Nov 27 18:58:35 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2724 >/dev/null 2>/dev/null
selfserv with PID 2724 found at Tue Nov 27 18:58:35 EST 2012
selfserv with PID 2724 started at Tue Nov 27 18:58:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1867: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2724 at Tue Nov 27 18:58:36 EST 2012
kill -USR1 2724
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2724 killed at Tue Nov 27 18:58:36 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2781 >/dev/null 2>/dev/null
selfserv with PID 2781 found at Tue Nov 27 18:58:36 EST 2012
selfserv with PID 2781 started at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1868: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2781 at Tue Nov 27 18:58:36 EST 2012
kill -USR1 2781
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2781 killed at Tue Nov 27 18:58:36 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2838 >/dev/null 2>/dev/null
selfserv with PID 2838 found at Tue Nov 27 18:58:36 EST 2012
selfserv with PID 2838 started at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1869: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2838 at Tue Nov 27 18:58:36 EST 2012
kill -USR1 2838
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2838 killed at Tue Nov 27 18:58:36 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2895 >/dev/null 2>/dev/null
selfserv with PID 2895 found at Tue Nov 27 18:58:36 EST 2012
selfserv with PID 2895 started at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1870: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2895 at Tue Nov 27 18:58:36 EST 2012
kill -USR1 2895
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2895 killed at Tue Nov 27 18:58:36 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2952 >/dev/null 2>/dev/null
selfserv with PID 2952 found at Tue Nov 27 18:58:36 EST 2012
selfserv with PID 2952 started at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1871: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2952 at Tue Nov 27 18:58:36 EST 2012
kill -USR1 2952
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2952 killed at Tue Nov 27 18:58:36 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3009 >/dev/null 2>/dev/null
selfserv with PID 3009 found at Tue Nov 27 18:58:36 EST 2012
selfserv with PID 3009 started at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1872: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3009 at Tue Nov 27 18:58:37 EST 2012
kill -USR1 3009
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3009 killed at Tue Nov 27 18:58:37 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3066 >/dev/null 2>/dev/null
selfserv with PID 3066 found at Tue Nov 27 18:58:37 EST 2012
selfserv with PID 3066 started at Tue Nov 27 18:58:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1873: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3066 at Tue Nov 27 18:58:37 EST 2012
kill -USR1 3066
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3066 killed at Tue Nov 27 18:58:37 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3123 >/dev/null 2>/dev/null
selfserv with PID 3123 found at Tue Nov 27 18:58:37 EST 2012
selfserv with PID 3123 started at Tue Nov 27 18:58:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1874: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3123 at Tue Nov 27 18:58:37 EST 2012
kill -USR1 3123
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3123 killed at Tue Nov 27 18:58:37 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3180 >/dev/null 2>/dev/null
selfserv with PID 3180 found at Tue Nov 27 18:58:37 EST 2012
selfserv with PID 3180 started at Tue Nov 27 18:58:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1875: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3180 at Tue Nov 27 18:58:37 EST 2012
kill -USR1 3180
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3180 killed at Tue Nov 27 18:58:37 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3237 >/dev/null 2>/dev/null
selfserv with PID 3237 found at Tue Nov 27 18:58:37 EST 2012
selfserv with PID 3237 started at Tue Nov 27 18:58:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1876: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3237 at Tue Nov 27 18:58:38 EST 2012
kill -USR1 3237
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3237 killed at Tue Nov 27 18:58:38 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3295 >/dev/null 2>/dev/null
selfserv with PID 3295 found at Tue Nov 27 18:58:38 EST 2012
selfserv with PID 3295 started at Tue Nov 27 18:58:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1877: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3295 at Tue Nov 27 18:58:38 EST 2012
kill -USR1 3295
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3295 killed at Tue Nov 27 18:58:38 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3352 >/dev/null 2>/dev/null
selfserv with PID 3352 found at Tue Nov 27 18:58:38 EST 2012
selfserv with PID 3352 started at Tue Nov 27 18:58:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1878: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3352 at Tue Nov 27 18:58:38 EST 2012
kill -USR1 3352
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3352 killed at Tue Nov 27 18:58:38 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3409 >/dev/null 2>/dev/null
selfserv with PID 3409 found at Tue Nov 27 18:58:38 EST 2012
selfserv with PID 3409 started at Tue Nov 27 18:58:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1879: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3409 at Tue Nov 27 18:58:38 EST 2012
kill -USR1 3409
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3409 killed at Tue Nov 27 18:58:38 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 18:58:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3487 >/dev/null 2>/dev/null
selfserv with PID 3487 found at Tue Nov 27 18:58:38 EST 2012
selfserv with PID 3487 started at Tue Nov 27 18:58:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1880: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3487 at Tue Nov 27 18:58:39 EST 2012
kill -USR1 3487
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3487 killed at Tue Nov 27 18:58:39 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 18:58:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3550 >/dev/null 2>/dev/null
selfserv with PID 3550 found at Tue Nov 27 18:58:39 EST 2012
selfserv with PID 3550 started at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1881: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3550 at Tue Nov 27 18:58:39 EST 2012
kill -USR1 3550
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3550 killed at Tue Nov 27 18:58:39 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 18:58:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3613 >/dev/null 2>/dev/null
selfserv with PID 3613 found at Tue Nov 27 18:58:39 EST 2012
selfserv with PID 3613 started at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1882: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3613 at Tue Nov 27 18:58:39 EST 2012
kill -USR1 3613
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3613 killed at Tue Nov 27 18:58:39 EST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Tue Nov 27 18:58:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3676 >/dev/null 2>/dev/null
selfserv with PID 3676 found at Tue Nov 27 18:58:39 EST 2012
selfserv with PID 3676 started at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1883: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3676 at Tue Nov 27 18:58:39 EST 2012
kill -USR1 3676
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3676 killed at Tue Nov 27 18:58:39 EST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Tue Nov 27 18:58:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3739 >/dev/null 2>/dev/null
selfserv with PID 3739 found at Tue Nov 27 18:58:39 EST 2012
selfserv with PID 3739 started at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #1884: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3739 at Tue Nov 27 18:58:39 EST 2012
kill -USR1 3739
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3739 killed at Tue Nov 27 18:58:39 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 18:58:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3802 >/dev/null 2>/dev/null
selfserv with PID 3802 found at Tue Nov 27 18:58:39 EST 2012
selfserv with PID 3802 started at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1885: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3802 at Tue Nov 27 18:58:40 EST 2012
kill -USR1 3802
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3802 killed at Tue Nov 27 18:58:40 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 18:58:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3865 >/dev/null 2>/dev/null
selfserv with PID 3865 found at Tue Nov 27 18:58:40 EST 2012
selfserv with PID 3865 started at Tue Nov 27 18:58:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1886: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3865 at Tue Nov 27 18:58:40 EST 2012
kill -USR1 3865
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3865 killed at Tue Nov 27 18:58:40 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Tue Nov 27 18:58:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3928 >/dev/null 2>/dev/null
selfserv with PID 3928 found at Tue Nov 27 18:58:40 EST 2012
selfserv with PID 3928 started at Tue Nov 27 18:58:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #1887: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3928 at Tue Nov 27 18:58:40 EST 2012
kill -USR1 3928
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3928 killed at Tue Nov 27 18:58:40 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Tue Nov 27 18:58:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3991 >/dev/null 2>/dev/null
selfserv with PID 3991 found at Tue Nov 27 18:58:40 EST 2012
selfserv with PID 3991 started at Tue Nov 27 18:58:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02-sni1.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #1888: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3991 at Tue Nov 27 18:58:40 EST 2012
kill -USR1 3991
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3991 killed at Tue Nov 27 18:58:40 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 18:58:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4054 >/dev/null 2>/dev/null
selfserv with PID 4054 found at Tue Nov 27 18:58:40 EST 2012
selfserv with PID 4054 started at Tue Nov 27 18:58:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1889: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4054 at Tue Nov 27 18:58:41 EST 2012
kill -USR1 4054
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4054 killed at Tue Nov 27 18:58:41 EST 2012
ssl.sh: SSL Stress Test - server bypass/client normal - with ECC ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:58:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4186 >/dev/null 2>/dev/null
selfserv with PID 4186 found at Tue Nov 27 18:58:41 EST 2012
selfserv with PID 4186 started at Tue Nov 27 18:58:41 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 1000 -C A \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:41 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:41 EST 2012
ssl.sh: #1890: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4186 at Tue Nov 27 18:58:41 EST 2012
kill -USR1 4186
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4186 killed at Tue Nov 27 18:58:41 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:58:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4262 >/dev/null 2>/dev/null
selfserv with PID 4262 found at Tue Nov 27 18:58:41 EST 2012
selfserv with PID 4262 started at Tue Nov 27 18:58:41 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 1000 -C c -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:41 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:41 EST 2012
ssl.sh: #1891: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4262 at Tue Nov 27 18:58:41 EST 2012
kill -USR1 4262
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4262 killed at Tue Nov 27 18:58:41 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:58:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4338 >/dev/null 2>/dev/null
selfserv with PID 4338 found at Tue Nov 27 18:58:42 EST 2012
selfserv with PID 4338 started at Tue Nov 27 18:58:42 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 1000 -C c \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:42 EST 2012
ssl.sh: #1892: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4338 at Tue Nov 27 18:58:42 EST 2012
kill -USR1 4338
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4338 killed at Tue Nov 27 18:58:42 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 18:58:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4415 >/dev/null 2>/dev/null
selfserv with PID 4415 found at Tue Nov 27 18:58:42 EST 2012
selfserv with PID 4415 started at Tue Nov 27 18:58:42 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 1000 -C c -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:42 EST 2012
ssl.sh: #1893: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4415 at Tue Nov 27 18:58:42 EST 2012
kill -USR1 4415
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4415 killed at Tue Nov 27 18:58:42 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 18:58:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4491 >/dev/null 2>/dev/null
selfserv with PID 4491 found at Tue Nov 27 18:58:42 EST 2012
selfserv with PID 4491 started at Tue Nov 27 18:58:42 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 1000 -C c -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 18:58:43 EST 2012
ssl.sh: #1894: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4491 at Tue Nov 27 18:58:43 EST 2012
kill -USR1 4491
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4491 killed at Tue Nov 27 18:58:43 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 18:58:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4567 >/dev/null 2>/dev/null
selfserv with PID 4567 found at Tue Nov 27 18:58:43 EST 2012
selfserv with PID 4567 started at Tue Nov 27 18:58:43 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 1000 -C c -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:43 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:43 EST 2012
ssl.sh: #1895: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4567 at Tue Nov 27 18:58:43 EST 2012
kill -USR1 4567
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4567 killed at Tue Nov 27 18:58:43 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 18:58:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4643 >/dev/null 2>/dev/null
selfserv with PID 4643 found at Tue Nov 27 18:58:43 EST 2012
selfserv with PID 4643 started at Tue Nov 27 18:58:43 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:43 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 18:58:44 EST 2012
ssl.sh: #1896: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4643 at Tue Nov 27 18:58:44 EST 2012
kill -USR1 4643
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4643 killed at Tue Nov 27 18:58:44 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 18:58:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4719 >/dev/null 2>/dev/null
selfserv with PID 4719 found at Tue Nov 27 18:58:44 EST 2012
selfserv with PID 4719 started at Tue Nov 27 18:58:44 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:44 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 18:58:44 EST 2012
ssl.sh: #1897: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4719 at Tue Nov 27 18:58:44 EST 2012
kill -USR1 4719
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4719 killed at Tue Nov 27 18:58:44 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Tue Nov 27 18:58:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4801 >/dev/null 2>/dev/null
selfserv with PID 4801 found at Tue Nov 27 18:58:44 EST 2012
selfserv with PID 4801 started at Tue Nov 27 18:58:44 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:44 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 18:58:45 EST 2012
ssl.sh: #1898: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4801 at Tue Nov 27 18:58:45 EST 2012
kill -USR1 4801
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4801 killed at Tue Nov 27 18:58:45 EST 2012
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:58:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4898 >/dev/null 2>/dev/null
selfserv with PID 4898 found at Tue Nov 27 18:58:45 EST 2012
selfserv with PID 4898 started at Tue Nov 27 18:58:45 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 100 -C A -N -n TestUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:45 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:45 EST 2012
ssl.sh: #1899: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4898 at Tue Nov 27 18:58:45 EST 2012
kill -USR1 4898
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4898 killed at Tue Nov 27 18:58:45 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:58:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4974 >/dev/null 2>/dev/null
selfserv with PID 4974 found at Tue Nov 27 18:58:46 EST 2012
selfserv with PID 4974 started at Tue Nov 27 18:58:46 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:46 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:46 EST 2012
ssl.sh: #1900: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4974 at Tue Nov 27 18:58:46 EST 2012
kill -USR1 4974
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4974 killed at Tue Nov 27 18:58:46 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:58:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5049 >/dev/null 2>/dev/null
selfserv with PID 5049 found at Tue Nov 27 18:58:46 EST 2012
selfserv with PID 5049 started at Tue Nov 27 18:58:46 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 100 -C c -N -n TestUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:46 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:47 EST 2012
ssl.sh: #1901: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5049 at Tue Nov 27 18:58:47 EST 2012
kill -USR1 5049
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5049 killed at Tue Nov 27 18:58:47 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 18:58:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5124 >/dev/null 2>/dev/null
selfserv with PID 5124 found at Tue Nov 27 18:58:47 EST 2012
selfserv with PID 5124 started at Tue Nov 27 18:58:47 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:47 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 18:58:47 EST 2012
ssl.sh: #1902: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5124 at Tue Nov 27 18:58:47 EST 2012
kill -USR1 5124
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5124 killed at Tue Nov 27 18:58:47 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 18:58:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5200 >/dev/null 2>/dev/null
selfserv with PID 5200 found at Tue Nov 27 18:58:47 EST 2012
selfserv with PID 5200 started at Tue Nov 27 18:58:47 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:47 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:47 EST 2012
ssl.sh: #1903: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5200 at Tue Nov 27 18:58:47 EST 2012
kill -USR1 5200
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5200 killed at Tue Nov 27 18:58:47 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 18:58:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5276 >/dev/null 2>/dev/null
selfserv with PID 5276 found at Tue Nov 27 18:58:47 EST 2012
selfserv with PID 5276 started at Tue Nov 27 18:58:47 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:47 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:48 EST 2012
ssl.sh: #1904: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5276 at Tue Nov 27 18:58:48 EST 2012
kill -USR1 5276
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5276 killed at Tue Nov 27 18:58:48 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 18:58:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5353 >/dev/null 2>/dev/null
selfserv with PID 5353 found at Tue Nov 27 18:58:48 EST 2012
selfserv with PID 5353 started at Tue Nov 27 18:58:48 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:48 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 18:58:48 EST 2012
ssl.sh: #1905: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5353 at Tue Nov 27 18:58:48 EST 2012
kill -USR1 5353
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5353 killed at Tue Nov 27 18:58:48 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 18:58:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5429 >/dev/null 2>/dev/null
selfserv with PID 5429 found at Tue Nov 27 18:58:48 EST 2012
selfserv with PID 5429 started at Tue Nov 27 18:58:48 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:48 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 18:58:48 EST 2012
ssl.sh: #1906: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5429 at Tue Nov 27 18:58:48 EST 2012
kill -USR1 5429
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5429 killed at Tue Nov 27 18:58:48 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 18:58:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5511 >/dev/null 2>/dev/null
selfserv with PID 5511 found at Tue Nov 27 18:58:48 EST 2012
selfserv with PID 5511 started at Tue Nov 27 18:58:48 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:48 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 18:58:49 EST 2012
ssl.sh: #1907: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5511 at Tue Nov 27 18:58:49 EST 2012
kill -USR1 5511
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5511 killed at Tue Nov 27 18:58:49 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 18:58:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5593 >/dev/null 2>/dev/null
selfserv with PID 5593 found at Tue Nov 27 18:58:49 EST 2012
selfserv with PID 5593 started at Tue Nov 27 18:58:49 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:49 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 18:58:49 EST 2012
ssl.sh: #1908: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5593 at Tue Nov 27 18:58:49 EST 2012
kill -USR1 5593
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5593 killed at Tue Nov 27 18:58:49 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:58:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5690 >/dev/null 2>/dev/null
selfserv with PID 5690 found at Tue Nov 27 18:58:49 EST 2012
selfserv with PID 5690 started at Tue Nov 27 18:58:49 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 100 -C :C009 -N -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:49 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:50 EST 2012
ssl.sh: #1909: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5690 at Tue Nov 27 18:58:50 EST 2012
kill -USR1 5690
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5690 killed at Tue Nov 27 18:58:50 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 18:58:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5765 >/dev/null 2>/dev/null
selfserv with PID 5765 found at Tue Nov 27 18:58:50 EST 2012
selfserv with PID 5765 started at Tue Nov 27 18:58:50 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 1000 -C :C013 -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:50 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:51 EST 2012
ssl.sh: #1910: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5765 at Tue Nov 27 18:58:51 EST 2012
kill -USR1 5765
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5765 killed at Tue Nov 27 18:58:51 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:58:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5841 >/dev/null 2>/dev/null
selfserv with PID 5841 found at Tue Nov 27 18:58:51 EST 2012
selfserv with PID 5841 started at Tue Nov 27 18:58:51 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C :C004 -N \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:51 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:52 EST 2012
ssl.sh: #1911: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5841 at Tue Nov 27 18:58:52 EST 2012
kill -USR1 5841
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5841 killed at Tue Nov 27 18:58:52 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:58:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5916 >/dev/null 2>/dev/null
selfserv with PID 5916 found at Tue Nov 27 18:58:52 EST 2012
selfserv with PID 5916 started at Tue Nov 27 18:58:52 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C :C00E -N \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:52 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:53 EST 2012
ssl.sh: #1912: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5916 at Tue Nov 27 18:58:53 EST 2012
kill -USR1 5916
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5916 killed at Tue Nov 27 18:58:53 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 18:58:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5991 >/dev/null 2>/dev/null
selfserv with PID 5991 found at Tue Nov 27 18:58:53 EST 2012
selfserv with PID 5991 started at Tue Nov 27 18:58:53 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 1000 -C :C013 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:53 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:53 EST 2012
ssl.sh: #1913: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5991 at Tue Nov 27 18:58:53 EST 2012
kill -USR1 5991
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5991 killed at Tue Nov 27 18:58:53 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 18:58:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6067 >/dev/null 2>/dev/null
selfserv with PID 6067 found at Tue Nov 27 18:58:53 EST 2012
selfserv with PID 6067 started at Tue Nov 27 18:58:53 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 1000 -C :C004 -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:53 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 18:58:54 EST 2012
ssl.sh: #1914: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6067 at Tue Nov 27 18:58:54 EST 2012
kill -USR1 6067
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6067 killed at Tue Nov 27 18:58:54 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:58:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6165 >/dev/null 2>/dev/null
selfserv with PID 6165 found at Tue Nov 27 18:58:54 EST 2012
selfserv with PID 6165 started at Tue Nov 27 18:58:54 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:54 EST 2012
ssl.sh: #1915: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6165 at Tue Nov 27 18:58:54 EST 2012
kill -USR1 6165
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6165 killed at Tue Nov 27 18:58:54 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 18:58:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6240 >/dev/null 2>/dev/null
selfserv with PID 6240 found at Tue Nov 27 18:58:54 EST 2012
selfserv with PID 6240 started at Tue Nov 27 18:58:54 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:54 EST 2012
ssl.sh: #1916: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6240 at Tue Nov 27 18:58:54 EST 2012
kill -USR1 6240
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6240 killed at Tue Nov 27 18:58:54 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:58:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6316 >/dev/null 2>/dev/null
selfserv with PID 6316 found at Tue Nov 27 18:58:54 EST 2012
selfserv with PID 6316 started at Tue Nov 27 18:58:54 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 10 -C :C004 -N -n TestUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:55 EST 2012
ssl.sh: #1917: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6316 at Tue Nov 27 18:58:55 EST 2012
kill -USR1 6316
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6316 killed at Tue Nov 27 18:58:55 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:58:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6391 >/dev/null 2>/dev/null
selfserv with PID 6391 found at Tue Nov 27 18:58:55 EST 2012
selfserv with PID 6391 started at Tue Nov 27 18:58:55 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:55 EST 2012
ssl.sh: #1918: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6391 at Tue Nov 27 18:58:55 EST 2012
kill -USR1 6391
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6391 killed at Tue Nov 27 18:58:55 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 18:58:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6466 >/dev/null 2>/dev/null
selfserv with PID 6466 found at Tue Nov 27 18:58:55 EST 2012
selfserv with PID 6466 started at Tue Nov 27 18:58:55 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 100 -C :C013 -n TestUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:55 EST 2012
ssl.sh: #1919: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6466 at Tue Nov 27 18:58:55 EST 2012
kill -USR1 6466
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6466 killed at Tue Nov 27 18:58:55 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 18:58:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6542 >/dev/null 2>/dev/null
selfserv with PID 6542 found at Tue Nov 27 18:58:55 EST 2012
selfserv with PID 6542 started at Tue Nov 27 18:58:55 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 18:58:56 EST 2012
ssl.sh: #1920: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6542 at Tue Nov 27 18:58:56 EST 2012
kill -USR1 6542
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6542 killed at Tue Nov 27 18:58:56 EST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client normal - with ECC ===============================
selfserv starting at Tue Nov 27 18:58:56 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
selfserv with PID 6605 started at Tue Nov 27 18:58:56 EST 2012
ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1921: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1922: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1923: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1924: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1925: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1926: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1927: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1928: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1929: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1930: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1931: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1932: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1933: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1934: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1935: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1936: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1937: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1938: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1939: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1940: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1941: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1942: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1943: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1944: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1945: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1946: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1947: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1948: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1949: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1950: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1951: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1952: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1953: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1954: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1955: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1956: TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1957: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1958: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1959: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1960: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1961: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1962: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1963: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1964: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1965: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1966: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1967: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1968: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1969: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1970: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 6605 at Tue Nov 27 18:59:00 EST 2012
kill -USR1 6605
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6605 killed at Tue Nov 27 18:59:00 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:00 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8024 >/dev/null 2>/dev/null
selfserv with PID 8024 found at Tue Nov 27 18:59:00 EST 2012
selfserv with PID 8024 started at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1971: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8024 >/dev/null 2>/dev/null
selfserv with PID 8024 found at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1972: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8024 >/dev/null 2>/dev/null
selfserv with PID 8024 found at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1973: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8024 >/dev/null 2>/dev/null
selfserv with PID 8024 found at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1974: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8024 >/dev/null 2>/dev/null
selfserv with PID 8024 found at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1975: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8024 at Tue Nov 27 18:59:00 EST 2012
kill -USR1 8024
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8024 killed at Tue Nov 27 18:59:00 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:00 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:00 EST 2012
selfserv with PID 8172 started at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1976: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1977: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1978: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1979: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1980: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1981: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1982: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1983: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1984: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1985: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1986: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1987: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1988: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1989: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1990: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8172 at Tue Nov 27 18:59:02 EST 2012
kill -USR1 8172
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8172 killed at Tue Nov 27 18:59:02 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:02 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8571 >/dev/null 2>/dev/null
selfserv with PID 8571 found at Tue Nov 27 18:59:02 EST 2012
selfserv with PID 8571 started at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1991: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8571 >/dev/null 2>/dev/null
selfserv with PID 8571 found at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1992: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8571 >/dev/null 2>/dev/null
selfserv with PID 8571 found at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1993: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8571 >/dev/null 2>/dev/null
selfserv with PID 8571 found at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1994: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8571 >/dev/null 2>/dev/null
selfserv with PID 8571 found at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1995: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8571 at Tue Nov 27 18:59:02 EST 2012
kill -USR1 8571
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8571 killed at Tue Nov 27 18:59:02 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:02 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:02 EST 2012
selfserv with PID 8719 started at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1996: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1997: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1998: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1999: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2000: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2001: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2002: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2003: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2004: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2005: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2006: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2007: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2008: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2009: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2010: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8719 at Tue Nov 27 18:59:04 EST 2012
kill -USR1 8719
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8719 killed at Tue Nov 27 18:59:04 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:04 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9104 >/dev/null 2>/dev/null
selfserv with PID 9104 found at Tue Nov 27 18:59:04 EST 2012
selfserv with PID 9104 started at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2011: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 9104 >/dev/null 2>/dev/null
selfserv with PID 9104 found at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2012: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9104 >/dev/null 2>/dev/null
selfserv with PID 9104 found at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2013: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9104 >/dev/null 2>/dev/null
selfserv with PID 9104 found at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2014: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9104 >/dev/null 2>/dev/null
selfserv with PID 9104 found at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2015: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 9104 at Tue Nov 27 18:59:04 EST 2012
kill -USR1 9104
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9104 killed at Tue Nov 27 18:59:04 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:04 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9252 >/dev/null 2>/dev/null
selfserv with PID 9252 found at Tue Nov 27 18:59:04 EST 2012
selfserv with PID 9252 started at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2016: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 9252 >/dev/null 2>/dev/null
selfserv with PID 9252 found at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2017: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9252 >/dev/null 2>/dev/null
selfserv with PID 9252 found at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2018: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9252 >/dev/null 2>/dev/null
selfserv with PID 9252 found at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2019: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9252 >/dev/null 2>/dev/null
selfserv with PID 9252 found at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2020: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9252 at Tue Nov 27 18:59:05 EST 2012
kill -USR1 9252
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9252 killed at Tue Nov 27 18:59:05 EST 2012
ssl.sh: SSL Client Authentication Extended Test - server bypass/client normal - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9451 >/dev/null 2>/dev/null
selfserv with PID 9451 found at Tue Nov 27 18:59:05 EST 2012
selfserv with PID 9451 started at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2021: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9451 at Tue Nov 27 18:59:05 EST 2012
kill -USR1 9451
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9451 killed at Tue Nov 27 18:59:05 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:59:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9508 >/dev/null 2>/dev/null
selfserv with PID 9508 found at Tue Nov 27 18:59:05 EST 2012
selfserv with PID 9508 started at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2022: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9508 at Tue Nov 27 18:59:05 EST 2012
kill -USR1 9508
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9508 killed at Tue Nov 27 18:59:05 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:59:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9565 >/dev/null 2>/dev/null
selfserv with PID 9565 found at Tue Nov 27 18:59:05 EST 2012
selfserv with PID 9565 started at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2023: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9565 at Tue Nov 27 18:59:06 EST 2012
kill -USR1 9565
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9565 killed at Tue Nov 27 18:59:06 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9622 >/dev/null 2>/dev/null
selfserv with PID 9622 found at Tue Nov 27 18:59:06 EST 2012
selfserv with PID 9622 started at Tue Nov 27 18:59:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2024: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9622 at Tue Nov 27 18:59:06 EST 2012
kill -USR1 9622
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9622 killed at Tue Nov 27 18:59:06 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:59:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9679 >/dev/null 2>/dev/null
selfserv with PID 9679 found at Tue Nov 27 18:59:06 EST 2012
selfserv with PID 9679 started at Tue Nov 27 18:59:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2025: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9679 at Tue Nov 27 18:59:06 EST 2012
kill -USR1 9679
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9679 killed at Tue Nov 27 18:59:06 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:59:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9736 >/dev/null 2>/dev/null
selfserv with PID 9736 found at Tue Nov 27 18:59:06 EST 2012
selfserv with PID 9736 started at Tue Nov 27 18:59:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2026: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9736 at Tue Nov 27 18:59:06 EST 2012
kill -USR1 9736
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9736 killed at Tue Nov 27 18:59:06 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9793 >/dev/null 2>/dev/null
selfserv with PID 9793 found at Tue Nov 27 18:59:06 EST 2012
selfserv with PID 9793 started at Tue Nov 27 18:59:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2027: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9793 at Tue Nov 27 18:59:06 EST 2012
kill -USR1 9793
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9793 killed at Tue Nov 27 18:59:06 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:59:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9850 >/dev/null 2>/dev/null
selfserv with PID 9850 found at Tue Nov 27 18:59:07 EST 2012
selfserv with PID 9850 started at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2028: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9850 at Tue Nov 27 18:59:07 EST 2012
kill -USR1 9850
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9850 killed at Tue Nov 27 18:59:07 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:59:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9907 >/dev/null 2>/dev/null
selfserv with PID 9907 found at Tue Nov 27 18:59:07 EST 2012
selfserv with PID 9907 started at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2029: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9907 at Tue Nov 27 18:59:07 EST 2012
kill -USR1 9907
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9907 killed at Tue Nov 27 18:59:07 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9964 >/dev/null 2>/dev/null
selfserv with PID 9964 found at Tue Nov 27 18:59:07 EST 2012
selfserv with PID 9964 started at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2030: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9964 at Tue Nov 27 18:59:07 EST 2012
kill -USR1 9964
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9964 killed at Tue Nov 27 18:59:07 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:59:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10021 >/dev/null 2>/dev/null
selfserv with PID 10021 found at Tue Nov 27 18:59:07 EST 2012
selfserv with PID 10021 started at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2031: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10021 at Tue Nov 27 18:59:07 EST 2012
kill -USR1 10021
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10021 killed at Tue Nov 27 18:59:07 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:59:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10078 >/dev/null 2>/dev/null
selfserv with PID 10078 found at Tue Nov 27 18:59:07 EST 2012
selfserv with PID 10078 started at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2032: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10078 at Tue Nov 27 18:59:08 EST 2012
kill -USR1 10078
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10078 killed at Tue Nov 27 18:59:08 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:08 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10135 >/dev/null 2>/dev/null
selfserv with PID 10135 found at Tue Nov 27 18:59:08 EST 2012
selfserv with PID 10135 started at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2033: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10135 at Tue Nov 27 18:59:08 EST 2012
kill -USR1 10135
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10135 killed at Tue Nov 27 18:59:08 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:08 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10192 >/dev/null 2>/dev/null
selfserv with PID 10192 found at Tue Nov 27 18:59:08 EST 2012
selfserv with PID 10192 started at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2034: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10192 at Tue Nov 27 18:59:08 EST 2012
kill -USR1 10192
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10192 killed at Tue Nov 27 18:59:08 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:08 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10249 >/dev/null 2>/dev/null
selfserv with PID 10249 found at Tue Nov 27 18:59:08 EST 2012
selfserv with PID 10249 started at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2035: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10249 at Tue Nov 27 18:59:08 EST 2012
kill -USR1 10249
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10249 killed at Tue Nov 27 18:59:08 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:08 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10306 >/dev/null 2>/dev/null
selfserv with PID 10306 found at Tue Nov 27 18:59:08 EST 2012
selfserv with PID 10306 started at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2036: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10306 at Tue Nov 27 18:59:08 EST 2012
kill -USR1 10306
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10306 killed at Tue Nov 27 18:59:08 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:08 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10363 >/dev/null 2>/dev/null
selfserv with PID 10363 found at Tue Nov 27 18:59:08 EST 2012
selfserv with PID 10363 started at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2037: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10363 at Tue Nov 27 18:59:09 EST 2012
kill -USR1 10363
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10363 killed at Tue Nov 27 18:59:09 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10420 >/dev/null 2>/dev/null
selfserv with PID 10420 found at Tue Nov 27 18:59:09 EST 2012
selfserv with PID 10420 started at Tue Nov 27 18:59:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2038: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10420 at Tue Nov 27 18:59:09 EST 2012
kill -USR1 10420
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10420 killed at Tue Nov 27 18:59:09 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10477 >/dev/null 2>/dev/null
selfserv with PID 10477 found at Tue Nov 27 18:59:09 EST 2012
selfserv with PID 10477 started at Tue Nov 27 18:59:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2039: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10477 at Tue Nov 27 18:59:09 EST 2012
kill -USR1 10477
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10477 killed at Tue Nov 27 18:59:09 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10534 >/dev/null 2>/dev/null
selfserv with PID 10534 found at Tue Nov 27 18:59:09 EST 2012
selfserv with PID 10534 started at Tue Nov 27 18:59:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2040: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10534 at Tue Nov 27 18:59:09 EST 2012
kill -USR1 10534
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10534 killed at Tue Nov 27 18:59:09 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10592 >/dev/null 2>/dev/null
selfserv with PID 10592 found at Tue Nov 27 18:59:09 EST 2012
selfserv with PID 10592 started at Tue Nov 27 18:59:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2041: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10592 at Tue Nov 27 18:59:10 EST 2012
kill -USR1 10592
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10592 killed at Tue Nov 27 18:59:10 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:10 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10649 >/dev/null 2>/dev/null
selfserv with PID 10649 found at Tue Nov 27 18:59:10 EST 2012
selfserv with PID 10649 started at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2042: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10649 at Tue Nov 27 18:59:10 EST 2012
kill -USR1 10649
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10649 killed at Tue Nov 27 18:59:10 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:10 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10706 >/dev/null 2>/dev/null
selfserv with PID 10706 found at Tue Nov 27 18:59:10 EST 2012
selfserv with PID 10706 started at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2043: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10706 at Tue Nov 27 18:59:10 EST 2012
kill -USR1 10706
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10706 killed at Tue Nov 27 18:59:10 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:10 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10763 >/dev/null 2>/dev/null
selfserv with PID 10763 found at Tue Nov 27 18:59:10 EST 2012
selfserv with PID 10763 started at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2044: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10763 at Tue Nov 27 18:59:10 EST 2012
kill -USR1 10763
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10763 killed at Tue Nov 27 18:59:10 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:10 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10820 >/dev/null 2>/dev/null
selfserv with PID 10820 found at Tue Nov 27 18:59:10 EST 2012
selfserv with PID 10820 started at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2045: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10820 at Tue Nov 27 18:59:10 EST 2012
kill -USR1 10820
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10820 killed at Tue Nov 27 18:59:10 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:10 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10877 >/dev/null 2>/dev/null
selfserv with PID 10877 found at Tue Nov 27 18:59:10 EST 2012
selfserv with PID 10877 started at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2046: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10877 at Tue Nov 27 18:59:11 EST 2012
kill -USR1 10877
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10877 killed at Tue Nov 27 18:59:11 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10934 >/dev/null 2>/dev/null
selfserv with PID 10934 found at Tue Nov 27 18:59:11 EST 2012
selfserv with PID 10934 started at Tue Nov 27 18:59:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2047: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10934 at Tue Nov 27 18:59:11 EST 2012
kill -USR1 10934
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10934 killed at Tue Nov 27 18:59:11 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10992 >/dev/null 2>/dev/null
selfserv with PID 10992 found at Tue Nov 27 18:59:11 EST 2012
selfserv with PID 10992 started at Tue Nov 27 18:59:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2048: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10992 at Tue Nov 27 18:59:11 EST 2012
kill -USR1 10992
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10992 killed at Tue Nov 27 18:59:11 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11049 >/dev/null 2>/dev/null
selfserv with PID 11049 found at Tue Nov 27 18:59:11 EST 2012
selfserv with PID 11049 started at Tue Nov 27 18:59:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2049: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11049 at Tue Nov 27 18:59:11 EST 2012
kill -USR1 11049
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11049 killed at Tue Nov 27 18:59:11 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11106 >/dev/null 2>/dev/null
selfserv with PID 11106 found at Tue Nov 27 18:59:11 EST 2012
selfserv with PID 11106 started at Tue Nov 27 18:59:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2050: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11106 at Tue Nov 27 18:59:12 EST 2012
kill -USR1 11106
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11106 killed at Tue Nov 27 18:59:12 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:12 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11178 >/dev/null 2>/dev/null
selfserv with PID 11178 found at Tue Nov 27 18:59:12 EST 2012
selfserv with PID 11178 started at Tue Nov 27 18:59:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2051: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11178 at Tue Nov 27 18:59:12 EST 2012
kill -USR1 11178
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11178 killed at Tue Nov 27 18:59:12 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:12 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11235 >/dev/null 2>/dev/null
selfserv with PID 11235 found at Tue Nov 27 18:59:12 EST 2012
selfserv with PID 11235 started at Tue Nov 27 18:59:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2052: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11235 at Tue Nov 27 18:59:12 EST 2012
kill -USR1 11235
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11235 killed at Tue Nov 27 18:59:12 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:12 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11292 >/dev/null 2>/dev/null
selfserv with PID 11292 found at Tue Nov 27 18:59:12 EST 2012
selfserv with PID 11292 started at Tue Nov 27 18:59:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2053: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11292 at Tue Nov 27 18:59:12 EST 2012
kill -USR1 11292
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11292 killed at Tue Nov 27 18:59:12 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:12 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11349 >/dev/null 2>/dev/null
selfserv with PID 11349 found at Tue Nov 27 18:59:12 EST 2012
selfserv with PID 11349 started at Tue Nov 27 18:59:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2054: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11349 at Tue Nov 27 18:59:12 EST 2012
kill -USR1 11349
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11349 killed at Tue Nov 27 18:59:13 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11406 >/dev/null 2>/dev/null
selfserv with PID 11406 found at Tue Nov 27 18:59:13 EST 2012
selfserv with PID 11406 started at Tue Nov 27 18:59:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2055: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11406 at Tue Nov 27 18:59:13 EST 2012
kill -USR1 11406
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11406 killed at Tue Nov 27 18:59:13 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11463 >/dev/null 2>/dev/null
selfserv with PID 11463 found at Tue Nov 27 18:59:13 EST 2012
selfserv with PID 11463 started at Tue Nov 27 18:59:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2056: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11463 at Tue Nov 27 18:59:13 EST 2012
kill -USR1 11463
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11463 killed at Tue Nov 27 18:59:13 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11520 >/dev/null 2>/dev/null
selfserv with PID 11520 found at Tue Nov 27 18:59:13 EST 2012
selfserv with PID 11520 started at Tue Nov 27 18:59:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2057: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11520 at Tue Nov 27 18:59:13 EST 2012
kill -USR1 11520
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11520 killed at Tue Nov 27 18:59:13 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11577 >/dev/null 2>/dev/null
selfserv with PID 11577 found at Tue Nov 27 18:59:13 EST 2012
selfserv with PID 11577 started at Tue Nov 27 18:59:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2058: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11577 at Tue Nov 27 18:59:13 EST 2012
kill -USR1 11577
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11577 killed at Tue Nov 27 18:59:14 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:14 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 18:59:14 EST 2012
selfserv with PID 11636 started at Tue Nov 27 18:59:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2059: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11636 at Tue Nov 27 18:59:14 EST 2012
kill -USR1 11636
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11636 killed at Tue Nov 27 18:59:14 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:14 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11693 >/dev/null 2>/dev/null
selfserv with PID 11693 found at Tue Nov 27 18:59:14 EST 2012
selfserv with PID 11693 started at Tue Nov 27 18:59:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2060: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11693 at Tue Nov 27 18:59:14 EST 2012
kill -USR1 11693
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11693 killed at Tue Nov 27 18:59:14 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:14 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11752 >/dev/null 2>/dev/null
selfserv with PID 11752 found at Tue Nov 27 18:59:14 EST 2012
selfserv with PID 11752 started at Tue Nov 27 18:59:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2061: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11752 at Tue Nov 27 18:59:14 EST 2012
kill -USR1 11752
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11752 killed at Tue Nov 27 18:59:14 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:14 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11809 >/dev/null 2>/dev/null
selfserv with PID 11809 found at Tue Nov 27 18:59:14 EST 2012
selfserv with PID 11809 started at Tue Nov 27 18:59:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2062: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11809 at Tue Nov 27 18:59:14 EST 2012
kill -USR1 11809
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11809 killed at Tue Nov 27 18:59:14 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:15 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11867 >/dev/null 2>/dev/null
selfserv with PID 11867 found at Tue Nov 27 18:59:15 EST 2012
selfserv with PID 11867 started at Tue Nov 27 18:59:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2063: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11867 at Tue Nov 27 18:59:15 EST 2012
kill -USR1 11867
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11867 killed at Tue Nov 27 18:59:15 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:15 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Tue Nov 27 18:59:15 EST 2012
selfserv with PID 11924 started at Tue Nov 27 18:59:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2064: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11924 at Tue Nov 27 18:59:15 EST 2012
kill -USR1 11924
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11924 killed at Tue Nov 27 18:59:15 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:15 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11981 >/dev/null 2>/dev/null
selfserv with PID 11981 found at Tue Nov 27 18:59:15 EST 2012
selfserv with PID 11981 started at Tue Nov 27 18:59:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2065: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11981 at Tue Nov 27 18:59:15 EST 2012
kill -USR1 11981
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11981 killed at Tue Nov 27 18:59:15 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:15 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12038 >/dev/null 2>/dev/null
selfserv with PID 12038 found at Tue Nov 27 18:59:15 EST 2012
selfserv with PID 12038 started at Tue Nov 27 18:59:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2066: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12038 at Tue Nov 27 18:59:16 EST 2012
kill -USR1 12038
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12038 killed at Tue Nov 27 18:59:16 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:16 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12095 >/dev/null 2>/dev/null
selfserv with PID 12095 found at Tue Nov 27 18:59:16 EST 2012
selfserv with PID 12095 started at Tue Nov 27 18:59:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2067: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12095 at Tue Nov 27 18:59:16 EST 2012
kill -USR1 12095
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12095 killed at Tue Nov 27 18:59:16 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:16 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12152 >/dev/null 2>/dev/null
selfserv with PID 12152 found at Tue Nov 27 18:59:16 EST 2012
selfserv with PID 12152 started at Tue Nov 27 18:59:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2068: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12152 at Tue Nov 27 18:59:16 EST 2012
kill -USR1 12152
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12152 killed at Tue Nov 27 18:59:16 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:16 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12209 >/dev/null 2>/dev/null
selfserv with PID 12209 found at Tue Nov 27 18:59:16 EST 2012
selfserv with PID 12209 started at Tue Nov 27 18:59:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2069: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12209 at Tue Nov 27 18:59:16 EST 2012
kill -USR1 12209
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12209 killed at Tue Nov 27 18:59:16 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:16 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12266 >/dev/null 2>/dev/null
selfserv with PID 12266 found at Tue Nov 27 18:59:16 EST 2012
selfserv with PID 12266 started at Tue Nov 27 18:59:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2070: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12266 at Tue Nov 27 18:59:16 EST 2012
kill -USR1 12266
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12266 killed at Tue Nov 27 18:59:17 EST 2012
ssl.sh: skipping TLS Server hello response without SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI for Extended Test
ssl.sh: skipping TLS Server response with alert for Extended Test
ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping TLS Server hello response without SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server bypass/client normal - with ECC ===============================
ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:59:17 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12441 >/dev/null 2>/dev/null
selfserv with PID 12441 found at Tue Nov 27 18:59:17 EST 2012
selfserv with PID 12441 started at Tue Nov 27 18:59:17 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 1000 -C c -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:17 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:17 EST 2012
ssl.sh: #2071: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 12441 at Tue Nov 27 18:59:17 EST 2012
kill -USR1 12441
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12441 killed at Tue Nov 27 18:59:17 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:59:17 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12517 >/dev/null 2>/dev/null
selfserv with PID 12517 found at Tue Nov 27 18:59:17 EST 2012
selfserv with PID 12517 started at Tue Nov 27 18:59:17 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 1000 -C c \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:17 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:17 EST 2012
ssl.sh: #2072: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 12517 at Tue Nov 27 18:59:18 EST 2012
kill -USR1 12517
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12517 killed at Tue Nov 27 18:59:18 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 18:59:18 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12593 >/dev/null 2>/dev/null
selfserv with PID 12593 found at Tue Nov 27 18:59:18 EST 2012
selfserv with PID 12593 started at Tue Nov 27 18:59:18 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 1000 -C c -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:18 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:18 EST 2012
ssl.sh: #2073: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 12593 at Tue Nov 27 18:59:18 EST 2012
kill -USR1 12593
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12593 killed at Tue Nov 27 18:59:18 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 18:59:18 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12669 >/dev/null 2>/dev/null
selfserv with PID 12669 found at Tue Nov 27 18:59:18 EST 2012
selfserv with PID 12669 started at Tue Nov 27 18:59:18 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:18 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 18:59:18 EST 2012
ssl.sh: #2074: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 12669 at Tue Nov 27 18:59:18 EST 2012
kill -USR1 12669
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12669 killed at Tue Nov 27 18:59:18 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 18:59:18 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12745 >/dev/null 2>/dev/null
selfserv with PID 12745 found at Tue Nov 27 18:59:18 EST 2012
selfserv with PID 12745 started at Tue Nov 27 18:59:18 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:18 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:19 EST 2012
ssl.sh: #2075: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 12745 at Tue Nov 27 18:59:19 EST 2012
kill -USR1 12745
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12745 killed at Tue Nov 27 18:59:19 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 18:59:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12821 >/dev/null 2>/dev/null
selfserv with PID 12821 found at Tue Nov 27 18:59:19 EST 2012
selfserv with PID 12821 started at Tue Nov 27 18:59:19 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:19 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 18:59:19 EST 2012
ssl.sh: #2076: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 12821 at Tue Nov 27 18:59:19 EST 2012
kill -USR1 12821
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12821 killed at Tue Nov 27 18:59:19 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 18:59:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12897 >/dev/null 2>/dev/null
selfserv with PID 12897 found at Tue Nov 27 18:59:19 EST 2012
selfserv with PID 12897 started at Tue Nov 27 18:59:19 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:19 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 18:59:20 EST 2012
ssl.sh: #2077: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 12897 at Tue Nov 27 18:59:20 EST 2012
kill -USR1 12897
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12897 killed at Tue Nov 27 18:59:20 EST 2012
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:59:20 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13002 >/dev/null 2>/dev/null
selfserv with PID 13002 found at Tue Nov 27 18:59:20 EST 2012
selfserv with PID 13002 started at Tue Nov 27 18:59:20 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:20 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:21 EST 2012
ssl.sh: #2078: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13002 at Tue Nov 27 18:59:21 EST 2012
kill -USR1 13002
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13002 killed at Tue Nov 27 18:59:21 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:59:21 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13077 >/dev/null 2>/dev/null
selfserv with PID 13077 found at Tue Nov 27 18:59:21 EST 2012
selfserv with PID 13077 started at Tue Nov 27 18:59:21 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:21 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:22 EST 2012
ssl.sh: #2079: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13077 at Tue Nov 27 18:59:22 EST 2012
kill -USR1 13077
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13077 killed at Tue Nov 27 18:59:22 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 18:59:22 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13152 >/dev/null 2>/dev/null
selfserv with PID 13152 found at Tue Nov 27 18:59:22 EST 2012
selfserv with PID 13152 started at Tue Nov 27 18:59:22 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:22 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 18:59:22 EST 2012
ssl.sh: #2080: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13152 at Tue Nov 27 18:59:22 EST 2012
kill -USR1 13152
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13152 killed at Tue Nov 27 18:59:22 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 18:59:22 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13228 >/dev/null 2>/dev/null
selfserv with PID 13228 found at Tue Nov 27 18:59:22 EST 2012
selfserv with PID 13228 started at Tue Nov 27 18:59:22 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:22 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:22 EST 2012
ssl.sh: #2081: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13228 at Tue Nov 27 18:59:22 EST 2012
kill -USR1 13228
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13228 killed at Tue Nov 27 18:59:22 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 18:59:22 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13304 >/dev/null 2>/dev/null
selfserv with PID 13304 found at Tue Nov 27 18:59:22 EST 2012
selfserv with PID 13304 started at Tue Nov 27 18:59:22 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:22 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:23 EST 2012
ssl.sh: #2082: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13304 at Tue Nov 27 18:59:23 EST 2012
kill -USR1 13304
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13304 killed at Tue Nov 27 18:59:23 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 18:59:23 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13380 >/dev/null 2>/dev/null
selfserv with PID 13380 found at Tue Nov 27 18:59:23 EST 2012
selfserv with PID 13380 started at Tue Nov 27 18:59:23 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:23 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 18:59:23 EST 2012
ssl.sh: #2083: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13380 at Tue Nov 27 18:59:23 EST 2012
kill -USR1 13380
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13380 killed at Tue Nov 27 18:59:23 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 18:59:23 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13456 >/dev/null 2>/dev/null
selfserv with PID 13456 found at Tue Nov 27 18:59:23 EST 2012
selfserv with PID 13456 started at Tue Nov 27 18:59:23 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:23 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 18:59:23 EST 2012
ssl.sh: #2084: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13456 at Tue Nov 27 18:59:23 EST 2012
kill -USR1 13456
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13456 killed at Tue Nov 27 18:59:23 EST 2012
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:59:23 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13561 >/dev/null 2>/dev/null
selfserv with PID 13561 found at Tue Nov 27 18:59:23 EST 2012
selfserv with PID 13561 started at Tue Nov 27 18:59:23 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 100 -C :C009 -N -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:23 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:24 EST 2012
ssl.sh: #2085: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13561 at Tue Nov 27 18:59:24 EST 2012
kill -USR1 13561
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13561 killed at Tue Nov 27 18:59:24 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 18:59:24 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13636 >/dev/null 2>/dev/null
selfserv with PID 13636 found at Tue Nov 27 18:59:24 EST 2012
selfserv with PID 13636 started at Tue Nov 27 18:59:24 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 1000 -C :C013 -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:25 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:25 EST 2012
ssl.sh: #2086: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13636 at Tue Nov 27 18:59:25 EST 2012
kill -USR1 13636
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13636 killed at Tue Nov 27 18:59:25 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:59:25 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13712 >/dev/null 2>/dev/null
selfserv with PID 13712 found at Tue Nov 27 18:59:25 EST 2012
selfserv with PID 13712 started at Tue Nov 27 18:59:25 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C :C004 -N \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:25 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:26 EST 2012
ssl.sh: #2087: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13712 at Tue Nov 27 18:59:26 EST 2012
kill -USR1 13712
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13712 killed at Tue Nov 27 18:59:26 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:59:26 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13787 >/dev/null 2>/dev/null
selfserv with PID 13787 found at Tue Nov 27 18:59:26 EST 2012
selfserv with PID 13787 started at Tue Nov 27 18:59:26 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C :C00E -N \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:26 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:27 EST 2012
ssl.sh: #2088: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13787 at Tue Nov 27 18:59:27 EST 2012
kill -USR1 13787
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13787 killed at Tue Nov 27 18:59:27 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 18:59:27 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13862 >/dev/null 2>/dev/null
selfserv with PID 13862 found at Tue Nov 27 18:59:27 EST 2012
selfserv with PID 13862 started at Tue Nov 27 18:59:27 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C013 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:27 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:27 EST 2012
ssl.sh: #2089: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13862 at Tue Nov 27 18:59:27 EST 2012
kill -USR1 13862
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13862 killed at Tue Nov 27 18:59:27 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 18:59:27 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13938 >/dev/null 2>/dev/null
selfserv with PID 13938 found at Tue Nov 27 18:59:27 EST 2012
selfserv with PID 13938 started at Tue Nov 27 18:59:27 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C004 -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:27 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 18:59:28 EST 2012
ssl.sh: #2090: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13938 at Tue Nov 27 18:59:28 EST 2012
kill -USR1 13938
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13938 killed at Tue Nov 27 18:59:28 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:59:28 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14035 >/dev/null 2>/dev/null
selfserv with PID 14035 found at Tue Nov 27 18:59:28 EST 2012
selfserv with PID 14035 started at Tue Nov 27 18:59:28 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:28 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:28 EST 2012
ssl.sh: #2091: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14035 at Tue Nov 27 18:59:28 EST 2012
kill -USR1 14035
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14035 killed at Tue Nov 27 18:59:28 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 18:59:28 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14110 >/dev/null 2>/dev/null
selfserv with PID 14110 found at Tue Nov 27 18:59:28 EST 2012
selfserv with PID 14110 started at Tue Nov 27 18:59:28 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:28 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:29 EST 2012
ssl.sh: #2092: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14110 at Tue Nov 27 18:59:29 EST 2012
kill -USR1 14110
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14110 killed at Tue Nov 27 18:59:29 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:59:29 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14186 >/dev/null 2>/dev/null
selfserv with PID 14186 found at Tue Nov 27 18:59:29 EST 2012
selfserv with PID 14186 started at Tue Nov 27 18:59:29 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:29 EST 2012
ssl.sh: #2093: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14186 at Tue Nov 27 18:59:29 EST 2012
kill -USR1 14186
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14186 killed at Tue Nov 27 18:59:29 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:59:29 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14262 >/dev/null 2>/dev/null
selfserv with PID 14262 found at Tue Nov 27 18:59:29 EST 2012
selfserv with PID 14262 started at Tue Nov 27 18:59:29 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:29 EST 2012
ssl.sh: #2094: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14262 at Tue Nov 27 18:59:30 EST 2012
kill -USR1 14262
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14262 killed at Tue Nov 27 18:59:30 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 18:59:30 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14337 >/dev/null 2>/dev/null
selfserv with PID 14337 found at Tue Nov 27 18:59:30 EST 2012
selfserv with PID 14337 started at Tue Nov 27 18:59:30 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:30 EST 2012
ssl.sh: #2095: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14337 at Tue Nov 27 18:59:30 EST 2012
kill -USR1 14337
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14337 killed at Tue Nov 27 18:59:30 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 18:59:30 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14413 >/dev/null 2>/dev/null
selfserv with PID 14413 found at Tue Nov 27 18:59:30 EST 2012
selfserv with PID 14413 started at Tue Nov 27 18:59:30 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 18:59:30 EST 2012
ssl.sh: #2096: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14413 at Tue Nov 27 18:59:30 EST 2012
kill -USR1 14413
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14413 killed at Tue Nov 27 18:59:30 EST 2012
ssl.sh: SSL Cipher Coverage - server normal/client bypass - with ECC ===============================
selfserv starting at Tue Nov 27 18:59:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:30 EST 2012
selfserv with PID 14482 started at Tue Nov 27 18:59:30 EST 2012
ssl.sh: running SSL2_RC4_128_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c A -V ssl2:ssl3 -O -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2097: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c B -V ssl2:ssl3 -O -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2098: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c C -V ssl2:ssl3 -O -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2099: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c D -V ssl2:ssl3 -O -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2100: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c E -V ssl2:ssl3 -O -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2101: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c F -V ssl2:ssl3 -O -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2102: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c B -V ssl2:tls1.1 -O -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2103: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c C -V ssl2:tls1.1 -O -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2104: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c E -V ssl2:tls1.1 -O -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2105: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2106: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2107: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2108: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2109: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2110: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2111: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2112: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2113: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2114: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2115: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2116: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2117: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2118: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2119: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2120: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2121: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2122: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2123: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2124: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2125: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2126: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2127: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2128: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2129: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2130: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2131: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2132: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2133: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2134: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2135: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2136: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2137: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2138: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2139: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2140: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2141: TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2142: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2143: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2144: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2145: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2146: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2147: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2148: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2149: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2150: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2151: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2152: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2153: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2154: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2155: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 14482 at Tue Nov 27 18:59:35 EST 2012
kill -USR1 14482
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14482 killed at Tue Nov 27 18:59:35 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16072 >/dev/null 2>/dev/null
selfserv with PID 16072 found at Tue Nov 27 18:59:35 EST 2012
selfserv with PID 16072 started at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2156: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 16072 >/dev/null 2>/dev/null
selfserv with PID 16072 found at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2157: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16072 >/dev/null 2>/dev/null
selfserv with PID 16072 found at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2158: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16072 >/dev/null 2>/dev/null
selfserv with PID 16072 found at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2159: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16072 >/dev/null 2>/dev/null
selfserv with PID 16072 found at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2160: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 16072 at Tue Nov 27 18:59:36 EST 2012
kill -USR1 16072
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16072 killed at Tue Nov 27 18:59:36 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
selfserv with PID 16220 started at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2161: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2162: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2163: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2164: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2165: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2166: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2167: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2168: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2169: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2170: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2171: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2172: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2173: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2174: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2175: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 16220 at Tue Nov 27 18:59:37 EST 2012
kill -USR1 16220
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16220 killed at Tue Nov 27 18:59:37 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16619 >/dev/null 2>/dev/null
selfserv with PID 16619 found at Tue Nov 27 18:59:37 EST 2012
selfserv with PID 16619 started at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2176: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 16619 >/dev/null 2>/dev/null
selfserv with PID 16619 found at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2177: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16619 >/dev/null 2>/dev/null
selfserv with PID 16619 found at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2178: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16619 >/dev/null 2>/dev/null
selfserv with PID 16619 found at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2179: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16619 >/dev/null 2>/dev/null
selfserv with PID 16619 found at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2180: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 16619 at Tue Nov 27 18:59:38 EST 2012
kill -USR1 16619
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16619 killed at Tue Nov 27 18:59:38 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
selfserv with PID 16767 started at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2181: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2182: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2183: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2184: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2185: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2186: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2187: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2188: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2189: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2190: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2191: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2192: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2193: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2194: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2195: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 16767 at Tue Nov 27 18:59:39 EST 2012
kill -USR1 16767
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16767 killed at Tue Nov 27 18:59:39 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17152 >/dev/null 2>/dev/null
selfserv with PID 17152 found at Tue Nov 27 18:59:39 EST 2012
selfserv with PID 17152 started at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2196: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17152 >/dev/null 2>/dev/null
selfserv with PID 17152 found at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2197: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17152 >/dev/null 2>/dev/null
selfserv with PID 17152 found at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2198: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17152 >/dev/null 2>/dev/null
selfserv with PID 17152 found at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2199: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17152 >/dev/null 2>/dev/null
selfserv with PID 17152 found at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2200: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 17152 at Tue Nov 27 18:59:39 EST 2012
kill -USR1 17152
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17152 killed at Tue Nov 27 18:59:40 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17300 >/dev/null 2>/dev/null
selfserv with PID 17300 found at Tue Nov 27 18:59:40 EST 2012
selfserv with PID 17300 started at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2201: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17300 >/dev/null 2>/dev/null
selfserv with PID 17300 found at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2202: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17300 >/dev/null 2>/dev/null
selfserv with PID 17300 found at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2203: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17300 >/dev/null 2>/dev/null
selfserv with PID 17300 found at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2204: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17300 >/dev/null 2>/dev/null
selfserv with PID 17300 found at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2205: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17300 at Tue Nov 27 18:59:40 EST 2012
kill -USR1 17300
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17300 killed at Tue Nov 27 18:59:40 EST 2012
ssl.sh: SSL Client Authentication - server normal/client bypass - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17500 >/dev/null 2>/dev/null
selfserv with PID 17500 found at Tue Nov 27 18:59:40 EST 2012
selfserv with PID 17500 started at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2206: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17500 at Tue Nov 27 18:59:40 EST 2012
kill -USR1 17500
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17500 killed at Tue Nov 27 18:59:40 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:59:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17557 >/dev/null 2>/dev/null
selfserv with PID 17557 found at Tue Nov 27 18:59:40 EST 2012
selfserv with PID 17557 started at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2207: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17557 at Tue Nov 27 18:59:40 EST 2012
kill -USR1 17557
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17557 killed at Tue Nov 27 18:59:40 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:59:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17614 >/dev/null 2>/dev/null
selfserv with PID 17614 found at Tue Nov 27 18:59:40 EST 2012
selfserv with PID 17614 started at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2208: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17614 at Tue Nov 27 18:59:41 EST 2012
kill -USR1 17614
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17614 killed at Tue Nov 27 18:59:41 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17671 >/dev/null 2>/dev/null
selfserv with PID 17671 found at Tue Nov 27 18:59:41 EST 2012
selfserv with PID 17671 started at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2209: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17671 at Tue Nov 27 18:59:41 EST 2012
kill -USR1 17671
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17671 killed at Tue Nov 27 18:59:41 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:59:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17728 >/dev/null 2>/dev/null
selfserv with PID 17728 found at Tue Nov 27 18:59:41 EST 2012
selfserv with PID 17728 started at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2210: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17728 at Tue Nov 27 18:59:41 EST 2012
kill -USR1 17728
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17728 killed at Tue Nov 27 18:59:41 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:59:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17785 >/dev/null 2>/dev/null
selfserv with PID 17785 found at Tue Nov 27 18:59:41 EST 2012
selfserv with PID 17785 started at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2211: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17785 at Tue Nov 27 18:59:41 EST 2012
kill -USR1 17785
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17785 killed at Tue Nov 27 18:59:41 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17842 >/dev/null 2>/dev/null
selfserv with PID 17842 found at Tue Nov 27 18:59:41 EST 2012
selfserv with PID 17842 started at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2212: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17842 at Tue Nov 27 18:59:41 EST 2012
kill -USR1 17842
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17842 killed at Tue Nov 27 18:59:41 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:59:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17899 >/dev/null 2>/dev/null
selfserv with PID 17899 found at Tue Nov 27 18:59:42 EST 2012
selfserv with PID 17899 started at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V :ssl3 -n TestUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2213: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17899 at Tue Nov 27 18:59:42 EST 2012
kill -USR1 17899
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17899 killed at Tue Nov 27 18:59:42 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:59:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17956 >/dev/null 2>/dev/null
selfserv with PID 17956 found at Tue Nov 27 18:59:42 EST 2012
selfserv with PID 17956 started at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V :ssl3 -n TestUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2214: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17956 at Tue Nov 27 18:59:42 EST 2012
kill -USR1 17956
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17956 killed at Tue Nov 27 18:59:42 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18013 >/dev/null 2>/dev/null
selfserv with PID 18013 found at Tue Nov 27 18:59:42 EST 2012
selfserv with PID 18013 started at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2215: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18013 at Tue Nov 27 18:59:42 EST 2012
kill -USR1 18013
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18013 killed at Tue Nov 27 18:59:42 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:59:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18071 >/dev/null 2>/dev/null
selfserv with PID 18071 found at Tue Nov 27 18:59:42 EST 2012
selfserv with PID 18071 started at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V :ssl3 -n TestUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2216: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18071 at Tue Nov 27 18:59:42 EST 2012
kill -USR1 18071
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18071 killed at Tue Nov 27 18:59:42 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:59:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18128 >/dev/null 2>/dev/null
selfserv with PID 18128 found at Tue Nov 27 18:59:42 EST 2012
selfserv with PID 18128 started at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V :ssl3 -n TestUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2217: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18128 at Tue Nov 27 18:59:43 EST 2012
kill -USR1 18128
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18128 killed at Tue Nov 27 18:59:43 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18185 >/dev/null 2>/dev/null
selfserv with PID 18185 found at Tue Nov 27 18:59:43 EST 2012
selfserv with PID 18185 started at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2218: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18185 at Tue Nov 27 18:59:43 EST 2012
kill -USR1 18185
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18185 killed at Tue Nov 27 18:59:43 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18242 >/dev/null 2>/dev/null
selfserv with PID 18242 found at Tue Nov 27 18:59:43 EST 2012
selfserv with PID 18242 started at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2219: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18242 at Tue Nov 27 18:59:43 EST 2012
kill -USR1 18242
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18242 killed at Tue Nov 27 18:59:43 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18299 >/dev/null 2>/dev/null
selfserv with PID 18299 found at Tue Nov 27 18:59:43 EST 2012
selfserv with PID 18299 started at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2220: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18299 at Tue Nov 27 18:59:43 EST 2012
kill -USR1 18299
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18299 killed at Tue Nov 27 18:59:43 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18356 >/dev/null 2>/dev/null
selfserv with PID 18356 found at Tue Nov 27 18:59:43 EST 2012
selfserv with PID 18356 started at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2221: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18356 at Tue Nov 27 18:59:43 EST 2012
kill -USR1 18356
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18356 killed at Tue Nov 27 18:59:43 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18413 >/dev/null 2>/dev/null
selfserv with PID 18413 found at Tue Nov 27 18:59:43 EST 2012
selfserv with PID 18413 started at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2222: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18413 at Tue Nov 27 18:59:44 EST 2012
kill -USR1 18413
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18413 killed at Tue Nov 27 18:59:44 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18470 >/dev/null 2>/dev/null
selfserv with PID 18470 found at Tue Nov 27 18:59:44 EST 2012
selfserv with PID 18470 started at Tue Nov 27 18:59:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2223: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18470 at Tue Nov 27 18:59:44 EST 2012
kill -USR1 18470
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18470 killed at Tue Nov 27 18:59:44 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18527 >/dev/null 2>/dev/null
selfserv with PID 18527 found at Tue Nov 27 18:59:44 EST 2012
selfserv with PID 18527 started at Tue Nov 27 18:59:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2224: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18527 at Tue Nov 27 18:59:44 EST 2012
kill -USR1 18527
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18527 killed at Tue Nov 27 18:59:44 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18584 >/dev/null 2>/dev/null
selfserv with PID 18584 found at Tue Nov 27 18:59:44 EST 2012
selfserv with PID 18584 started at Tue Nov 27 18:59:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2225: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18584 at Tue Nov 27 18:59:44 EST 2012
kill -USR1 18584
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18584 killed at Tue Nov 27 18:59:44 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18641 >/dev/null 2>/dev/null
selfserv with PID 18641 found at Tue Nov 27 18:59:44 EST 2012
selfserv with PID 18641 started at Tue Nov 27 18:59:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2226: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18641 at Tue Nov 27 18:59:44 EST 2012
kill -USR1 18641
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18641 killed at Tue Nov 27 18:59:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18698 >/dev/null 2>/dev/null
selfserv with PID 18698 found at Tue Nov 27 18:59:45 EST 2012
selfserv with PID 18698 started at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2227: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18698 at Tue Nov 27 18:59:45 EST 2012
kill -USR1 18698
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18698 killed at Tue Nov 27 18:59:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18755 >/dev/null 2>/dev/null
selfserv with PID 18755 found at Tue Nov 27 18:59:45 EST 2012
selfserv with PID 18755 started at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2228: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18755 at Tue Nov 27 18:59:45 EST 2012
kill -USR1 18755
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18755 killed at Tue Nov 27 18:59:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18812 >/dev/null 2>/dev/null
selfserv with PID 18812 found at Tue Nov 27 18:59:45 EST 2012
selfserv with PID 18812 started at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2229: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18812 at Tue Nov 27 18:59:45 EST 2012
kill -USR1 18812
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18812 killed at Tue Nov 27 18:59:45 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18869 >/dev/null 2>/dev/null
selfserv with PID 18869 found at Tue Nov 27 18:59:45 EST 2012
selfserv with PID 18869 started at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2230: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18869 at Tue Nov 27 18:59:45 EST 2012
kill -USR1 18869
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18869 killed at Tue Nov 27 18:59:45 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18926 >/dev/null 2>/dev/null
selfserv with PID 18926 found at Tue Nov 27 18:59:45 EST 2012
selfserv with PID 18926 started at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2231: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18926 at Tue Nov 27 18:59:46 EST 2012
kill -USR1 18926
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18926 killed at Tue Nov 27 18:59:46 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18983 >/dev/null 2>/dev/null
selfserv with PID 18983 found at Tue Nov 27 18:59:46 EST 2012
selfserv with PID 18983 started at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2232: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18983 at Tue Nov 27 18:59:46 EST 2012
kill -USR1 18983
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18983 killed at Tue Nov 27 18:59:46 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19040 >/dev/null 2>/dev/null
selfserv with PID 19040 found at Tue Nov 27 18:59:46 EST 2012
selfserv with PID 19040 started at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2233: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19040 at Tue Nov 27 18:59:46 EST 2012
kill -USR1 19040
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19040 killed at Tue Nov 27 18:59:46 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19097 >/dev/null 2>/dev/null
selfserv with PID 19097 found at Tue Nov 27 18:59:46 EST 2012
selfserv with PID 19097 started at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2234: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19097 at Tue Nov 27 18:59:46 EST 2012
kill -USR1 19097
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19097 killed at Tue Nov 27 18:59:46 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19154 >/dev/null 2>/dev/null
selfserv with PID 19154 found at Tue Nov 27 18:59:46 EST 2012
selfserv with PID 19154 started at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2235: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19154 at Tue Nov 27 18:59:46 EST 2012
kill -USR1 19154
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19154 killed at Tue Nov 27 18:59:46 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19226 >/dev/null 2>/dev/null
selfserv with PID 19226 found at Tue Nov 27 18:59:46 EST 2012
selfserv with PID 19226 started at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2236: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19226 at Tue Nov 27 18:59:47 EST 2012
kill -USR1 19226
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19226 killed at Tue Nov 27 18:59:47 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19283 >/dev/null 2>/dev/null
selfserv with PID 19283 found at Tue Nov 27 18:59:47 EST 2012
selfserv with PID 19283 started at Tue Nov 27 18:59:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2237: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19283 at Tue Nov 27 18:59:47 EST 2012
kill -USR1 19283
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19283 killed at Tue Nov 27 18:59:47 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19340 >/dev/null 2>/dev/null
selfserv with PID 19340 found at Tue Nov 27 18:59:47 EST 2012
selfserv with PID 19340 started at Tue Nov 27 18:59:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2238: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19340 at Tue Nov 27 18:59:47 EST 2012
kill -USR1 19340
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19340 killed at Tue Nov 27 18:59:47 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19397 >/dev/null 2>/dev/null
selfserv with PID 19397 found at Tue Nov 27 18:59:47 EST 2012
selfserv with PID 19397 started at Tue Nov 27 18:59:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2239: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19397 at Tue Nov 27 18:59:47 EST 2012
kill -USR1 19397
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19397 killed at Tue Nov 27 18:59:47 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19454 >/dev/null 2>/dev/null
selfserv with PID 19454 found at Tue Nov 27 18:59:47 EST 2012
selfserv with PID 19454 started at Tue Nov 27 18:59:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V :ssl3 -n TestUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2240: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19454 at Tue Nov 27 18:59:47 EST 2012
kill -USR1 19454
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19454 killed at Tue Nov 27 18:59:47 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19511 >/dev/null 2>/dev/null
selfserv with PID 19511 found at Tue Nov 27 18:59:48 EST 2012
selfserv with PID 19511 started at Tue Nov 27 18:59:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V :ssl3 -n TestUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2241: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19511 at Tue Nov 27 18:59:48 EST 2012
kill -USR1 19511
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19511 killed at Tue Nov 27 18:59:48 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19568 >/dev/null 2>/dev/null
selfserv with PID 19568 found at Tue Nov 27 18:59:48 EST 2012
selfserv with PID 19568 started at Tue Nov 27 18:59:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V :ssl3 -n TestUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2242: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19568 at Tue Nov 27 18:59:48 EST 2012
kill -USR1 19568
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19568 killed at Tue Nov 27 18:59:48 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19625 >/dev/null 2>/dev/null
selfserv with PID 19625 found at Tue Nov 27 18:59:48 EST 2012
selfserv with PID 19625 started at Tue Nov 27 18:59:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V :ssl3 -n TestUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2243: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19625 at Tue Nov 27 18:59:48 EST 2012
kill -USR1 19625
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19625 killed at Tue Nov 27 18:59:48 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19682 >/dev/null 2>/dev/null
selfserv with PID 19682 found at Tue Nov 27 18:59:48 EST 2012
selfserv with PID 19682 started at Tue Nov 27 18:59:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2244: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19682 at Tue Nov 27 18:59:48 EST 2012
kill -USR1 19682
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19682 killed at Tue Nov 27 18:59:48 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19739 >/dev/null 2>/dev/null
selfserv with PID 19739 found at Tue Nov 27 18:59:49 EST 2012
selfserv with PID 19739 started at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2245: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19739 at Tue Nov 27 18:59:49 EST 2012
kill -USR1 19739
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19739 killed at Tue Nov 27 18:59:49 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19796 >/dev/null 2>/dev/null
selfserv with PID 19796 found at Tue Nov 27 18:59:49 EST 2012
selfserv with PID 19796 started at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2246: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19796 at Tue Nov 27 18:59:49 EST 2012
kill -USR1 19796
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19796 killed at Tue Nov 27 18:59:49 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19853 >/dev/null 2>/dev/null
selfserv with PID 19853 found at Tue Nov 27 18:59:49 EST 2012
selfserv with PID 19853 started at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2247: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19853 at Tue Nov 27 18:59:49 EST 2012
kill -USR1 19853
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19853 killed at Tue Nov 27 18:59:49 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19910 >/dev/null 2>/dev/null
selfserv with PID 19910 found at Tue Nov 27 18:59:49 EST 2012
selfserv with PID 19910 started at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2248: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19910 at Tue Nov 27 18:59:49 EST 2012
kill -USR1 19910
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19910 killed at Tue Nov 27 18:59:49 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19967 >/dev/null 2>/dev/null
selfserv with PID 19967 found at Tue Nov 27 18:59:49 EST 2012
selfserv with PID 19967 started at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2249: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19967 at Tue Nov 27 18:59:50 EST 2012
kill -USR1 19967
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19967 killed at Tue Nov 27 18:59:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20024 >/dev/null 2>/dev/null
selfserv with PID 20024 found at Tue Nov 27 18:59:50 EST 2012
selfserv with PID 20024 started at Tue Nov 27 18:59:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2250: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20024 at Tue Nov 27 18:59:50 EST 2012
kill -USR1 20024
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20024 killed at Tue Nov 27 18:59:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20081 >/dev/null 2>/dev/null
selfserv with PID 20081 found at Tue Nov 27 18:59:50 EST 2012
selfserv with PID 20081 started at Tue Nov 27 18:59:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2251: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20081 at Tue Nov 27 18:59:50 EST 2012
kill -USR1 20081
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20081 killed at Tue Nov 27 18:59:50 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20138 >/dev/null 2>/dev/null
selfserv with PID 20138 found at Tue Nov 27 18:59:50 EST 2012
selfserv with PID 20138 started at Tue Nov 27 18:59:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2252: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20138 at Tue Nov 27 18:59:50 EST 2012
kill -USR1 20138
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20138 killed at Tue Nov 27 18:59:50 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20195 >/dev/null 2>/dev/null
selfserv with PID 20195 found at Tue Nov 27 18:59:50 EST 2012
selfserv with PID 20195 started at Tue Nov 27 18:59:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2253: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20195 at Tue Nov 27 18:59:51 EST 2012
kill -USR1 20195
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20195 killed at Tue Nov 27 18:59:51 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20253 >/dev/null 2>/dev/null
selfserv with PID 20253 found at Tue Nov 27 18:59:51 EST 2012
selfserv with PID 20253 started at Tue Nov 27 18:59:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2254: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20253 at Tue Nov 27 18:59:51 EST 2012
kill -USR1 20253
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20253 killed at Tue Nov 27 18:59:51 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20310 >/dev/null 2>/dev/null
selfserv with PID 20310 found at Tue Nov 27 18:59:51 EST 2012
selfserv with PID 20310 started at Tue Nov 27 18:59:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2255: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20310 at Tue Nov 27 18:59:51 EST 2012
kill -USR1 20310
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20310 killed at Tue Nov 27 18:59:51 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 18:59:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20388 >/dev/null 2>/dev/null
selfserv with PID 20388 found at Tue Nov 27 18:59:51 EST 2012
selfserv with PID 20388 started at Tue Nov 27 18:59:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2256: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20388 at Tue Nov 27 18:59:51 EST 2012
kill -USR1 20388
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20388 killed at Tue Nov 27 18:59:51 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 18:59:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20451 >/dev/null 2>/dev/null
selfserv with PID 20451 found at Tue Nov 27 18:59:51 EST 2012
selfserv with PID 20451 started at Tue Nov 27 18:59:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2257: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20451 at Tue Nov 27 18:59:52 EST 2012
kill -USR1 20451
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20451 killed at Tue Nov 27 18:59:52 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 18:59:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20514 >/dev/null 2>/dev/null
selfserv with PID 20514 found at Tue Nov 27 18:59:52 EST 2012
selfserv with PID 20514 started at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2258: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20514 at Tue Nov 27 18:59:52 EST 2012
kill -USR1 20514
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20514 killed at Tue Nov 27 18:59:52 EST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Tue Nov 27 18:59:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20577 >/dev/null 2>/dev/null
selfserv with PID 20577 found at Tue Nov 27 18:59:52 EST 2012
selfserv with PID 20577 started at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:ssl3 -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2259: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20577 at Tue Nov 27 18:59:52 EST 2012
kill -USR1 20577
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20577 killed at Tue Nov 27 18:59:52 EST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Tue Nov 27 18:59:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20640 >/dev/null 2>/dev/null
selfserv with PID 20640 found at Tue Nov 27 18:59:52 EST 2012
selfserv with PID 20640 started at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3:ssl3 -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2260: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20640 at Tue Nov 27 18:59:52 EST 2012
kill -USR1 20640
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20640 killed at Tue Nov 27 18:59:52 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 18:59:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20703 >/dev/null 2>/dev/null
selfserv with PID 20703 found at Tue Nov 27 18:59:52 EST 2012
selfserv with PID 20703 started at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2261: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20703 at Tue Nov 27 18:59:52 EST 2012
kill -USR1 20703
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20703 killed at Tue Nov 27 18:59:52 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 18:59:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20766 >/dev/null 2>/dev/null
selfserv with PID 20766 found at Tue Nov 27 18:59:53 EST 2012
selfserv with PID 20766 started at Tue Nov 27 18:59:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2262: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20766 at Tue Nov 27 18:59:53 EST 2012
kill -USR1 20766
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20766 killed at Tue Nov 27 18:59:53 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Tue Nov 27 18:59:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20829 >/dev/null 2>/dev/null
selfserv with PID 20829 found at Tue Nov 27 18:59:53 EST 2012
selfserv with PID 20829 started at Tue Nov 27 18:59:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #2263: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20829 at Tue Nov 27 18:59:53 EST 2012
kill -USR1 20829
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20829 killed at Tue Nov 27 18:59:53 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Tue Nov 27 18:59:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20892 >/dev/null 2>/dev/null
selfserv with PID 20892 found at Tue Nov 27 18:59:53 EST 2012
selfserv with PID 20892 started at Tue Nov 27 18:59:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02-sni1.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2264: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20892 at Tue Nov 27 18:59:53 EST 2012
kill -USR1 20892
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20892 killed at Tue Nov 27 18:59:53 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 18:59:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20955 >/dev/null 2>/dev/null
selfserv with PID 20955 found at Tue Nov 27 18:59:53 EST 2012
selfserv with PID 20955 started at Tue Nov 27 18:59:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
-V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2265: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20955 at Tue Nov 27 18:59:53 EST 2012
kill -USR1 20955
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20955 killed at Tue Nov 27 18:59:53 EST 2012
ssl.sh: SSL Stress Test - server normal/client bypass - with ECC ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:59:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21087 >/dev/null 2>/dev/null
selfserv with PID 21087 found at Tue Nov 27 18:59:54 EST 2012
selfserv with PID 21087 started at Tue Nov 27 18:59:54 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C A \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:54 EST 2012
ssl.sh: #2266: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21087 at Tue Nov 27 18:59:54 EST 2012
kill -USR1 21087
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21087 killed at Tue Nov 27 18:59:54 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:59:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21163 >/dev/null 2>/dev/null
selfserv with PID 21163 found at Tue Nov 27 18:59:54 EST 2012
selfserv with PID 21163 started at Tue Nov 27 18:59:54 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:54 EST 2012
ssl.sh: #2267: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21163 at Tue Nov 27 18:59:54 EST 2012
kill -USR1 21163
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21163 killed at Tue Nov 27 18:59:54 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:59:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21239 >/dev/null 2>/dev/null
selfserv with PID 21239 found at Tue Nov 27 18:59:54 EST 2012
selfserv with PID 21239 started at Tue Nov 27 18:59:54 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C c \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:55 EST 2012
ssl.sh: #2268: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21239 at Tue Nov 27 18:59:55 EST 2012
kill -USR1 21239
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21239 killed at Tue Nov 27 18:59:55 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 18:59:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21315 >/dev/null 2>/dev/null
selfserv with PID 21315 found at Tue Nov 27 18:59:55 EST 2012
selfserv with PID 21315 started at Tue Nov 27 18:59:55 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C c -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:55 EST 2012
ssl.sh: #2269: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21315 at Tue Nov 27 18:59:55 EST 2012
kill -USR1 21315
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21315 killed at Tue Nov 27 18:59:55 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 18:59:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21391 >/dev/null 2>/dev/null
selfserv with PID 21391 found at Tue Nov 27 18:59:55 EST 2012
selfserv with PID 21391 started at Tue Nov 27 18:59:55 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 18:59:56 EST 2012
ssl.sh: #2270: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21391 at Tue Nov 27 18:59:56 EST 2012
kill -USR1 21391
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21391 killed at Tue Nov 27 18:59:56 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 18:59:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21467 >/dev/null 2>/dev/null
selfserv with PID 21467 found at Tue Nov 27 18:59:56 EST 2012
selfserv with PID 21467 started at Tue Nov 27 18:59:56 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:56 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:56 EST 2012
ssl.sh: #2271: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21467 at Tue Nov 27 18:59:56 EST 2012
kill -USR1 21467
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21467 killed at Tue Nov 27 18:59:56 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 18:59:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21543 >/dev/null 2>/dev/null
selfserv with PID 21543 found at Tue Nov 27 18:59:56 EST 2012
selfserv with PID 21543 started at Tue Nov 27 18:59:56 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:56 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 18:59:57 EST 2012
ssl.sh: #2272: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21543 at Tue Nov 27 18:59:57 EST 2012
kill -USR1 21543
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21543 killed at Tue Nov 27 18:59:57 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 18:59:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21619 >/dev/null 2>/dev/null
selfserv with PID 21619 found at Tue Nov 27 18:59:57 EST 2012
selfserv with PID 21619 started at Tue Nov 27 18:59:57 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 18:59:57 EST 2012
ssl.sh: #2273: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21619 at Tue Nov 27 18:59:57 EST 2012
kill -USR1 21619
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21619 killed at Tue Nov 27 18:59:57 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Tue Nov 27 18:59:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21701 >/dev/null 2>/dev/null
selfserv with PID 21701 found at Tue Nov 27 18:59:57 EST 2012
selfserv with PID 21701 started at Tue Nov 27 18:59:57 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 18:59:58 EST 2012
ssl.sh: #2274: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21701 at Tue Nov 27 18:59:58 EST 2012
kill -USR1 21701
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21701 killed at Tue Nov 27 18:59:58 EST 2012
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:59:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21798 >/dev/null 2>/dev/null
selfserv with PID 21798 found at Tue Nov 27 18:59:58 EST 2012
selfserv with PID 21798 started at Tue Nov 27 18:59:58 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:59 EST 2012
ssl.sh: #2275: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21798 at Tue Nov 27 18:59:59 EST 2012
kill -USR1 21798
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21798 killed at Tue Nov 27 18:59:59 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:59:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21873 >/dev/null 2>/dev/null
selfserv with PID 21873 found at Tue Nov 27 18:59:59 EST 2012
selfserv with PID 21873 started at Tue Nov 27 18:59:59 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:59 EST 2012
ssl.sh: #2276: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21873 at Tue Nov 27 18:59:59 EST 2012
kill -USR1 21873
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21873 killed at Tue Nov 27 18:59:59 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:59:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 18:59:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21948 >/dev/null 2>/dev/null
selfserv with PID 21948 found at Tue Nov 27 18:59:59 EST 2012
selfserv with PID 21948 started at Tue Nov 27 18:59:59 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:00 EST 2012
ssl.sh: #2277: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21948 at Tue Nov 27 19:00:00 EST 2012
kill -USR1 21948
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21948 killed at Tue Nov 27 19:00:00 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:00:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22023 >/dev/null 2>/dev/null
selfserv with PID 22023 found at Tue Nov 27 19:00:00 EST 2012
selfserv with PID 22023 started at Tue Nov 27 19:00:00 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:00 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:00:00 EST 2012
ssl.sh: #2278: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22023 at Tue Nov 27 19:00:00 EST 2012
kill -USR1 22023
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22023 killed at Tue Nov 27 19:00:00 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:00:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22099 >/dev/null 2>/dev/null
selfserv with PID 22099 found at Tue Nov 27 19:00:00 EST 2012
selfserv with PID 22099 started at Tue Nov 27 19:00:00 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:00 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:00 EST 2012
ssl.sh: #2279: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22099 at Tue Nov 27 19:00:00 EST 2012
kill -USR1 22099
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22099 killed at Tue Nov 27 19:00:00 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:00:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22175 >/dev/null 2>/dev/null
selfserv with PID 22175 found at Tue Nov 27 19:00:00 EST 2012
selfserv with PID 22175 started at Tue Nov 27 19:00:00 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:00 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:01 EST 2012
ssl.sh: #2280: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22175 at Tue Nov 27 19:00:01 EST 2012
kill -USR1 22175
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22175 killed at Tue Nov 27 19:00:01 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:00:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22251 >/dev/null 2>/dev/null
selfserv with PID 22251 found at Tue Nov 27 19:00:01 EST 2012
selfserv with PID 22251 started at Tue Nov 27 19:00:01 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:01 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:00:01 EST 2012
ssl.sh: #2281: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22251 at Tue Nov 27 19:00:01 EST 2012
kill -USR1 22251
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22251 killed at Tue Nov 27 19:00:01 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:00:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22327 >/dev/null 2>/dev/null
selfserv with PID 22327 found at Tue Nov 27 19:00:01 EST 2012
selfserv with PID 22327 started at Tue Nov 27 19:00:01 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:01 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:00:01 EST 2012
ssl.sh: #2282: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22327 at Tue Nov 27 19:00:01 EST 2012
kill -USR1 22327
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22327 killed at Tue Nov 27 19:00:01 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 19:00:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22417 >/dev/null 2>/dev/null
selfserv with PID 22417 found at Tue Nov 27 19:00:01 EST 2012
selfserv with PID 22417 started at Tue Nov 27 19:00:01 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:01 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:00:02 EST 2012
ssl.sh: #2283: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22417 at Tue Nov 27 19:00:02 EST 2012
kill -USR1 22417
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22417 killed at Tue Nov 27 19:00:02 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 19:00:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22499 >/dev/null 2>/dev/null
selfserv with PID 22499 found at Tue Nov 27 19:00:02 EST 2012
selfserv with PID 22499 started at Tue Nov 27 19:00:02 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:02 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:00:02 EST 2012
ssl.sh: #2284: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22499 at Tue Nov 27 19:00:02 EST 2012
kill -USR1 22499
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22499 killed at Tue Nov 27 19:00:02 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:00:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22596 >/dev/null 2>/dev/null
selfserv with PID 22596 found at Tue Nov 27 19:00:02 EST 2012
selfserv with PID 22596 started at Tue Nov 27 19:00:02 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:02 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:03 EST 2012
ssl.sh: #2285: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22596 at Tue Nov 27 19:00:03 EST 2012
kill -USR1 22596
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22596 killed at Tue Nov 27 19:00:03 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:00:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22671 >/dev/null 2>/dev/null
selfserv with PID 22671 found at Tue Nov 27 19:00:03 EST 2012
selfserv with PID 22671 started at Tue Nov 27 19:00:03 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:03 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:04 EST 2012
ssl.sh: #2286: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22671 at Tue Nov 27 19:00:04 EST 2012
kill -USR1 22671
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22671 killed at Tue Nov 27 19:00:04 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:00:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22749 >/dev/null 2>/dev/null
selfserv with PID 22749 found at Tue Nov 27 19:00:04 EST 2012
selfserv with PID 22749 started at Tue Nov 27 19:00:04 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:04 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:05 EST 2012
ssl.sh: #2287: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22749 at Tue Nov 27 19:00:05 EST 2012
kill -USR1 22749
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22749 killed at Tue Nov 27 19:00:05 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:00:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22824 >/dev/null 2>/dev/null
selfserv with PID 22824 found at Tue Nov 27 19:00:05 EST 2012
selfserv with PID 22824 started at Tue Nov 27 19:00:05 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:06 EST 2012
ssl.sh: #2288: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22824 at Tue Nov 27 19:00:06 EST 2012
kill -USR1 22824
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22824 killed at Tue Nov 27 19:00:06 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:00:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22899 >/dev/null 2>/dev/null
selfserv with PID 22899 found at Tue Nov 27 19:00:06 EST 2012
selfserv with PID 22899 started at Tue Nov 27 19:00:06 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:06 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:06 EST 2012
ssl.sh: #2289: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22899 at Tue Nov 27 19:00:06 EST 2012
kill -USR1 22899
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22899 killed at Tue Nov 27 19:00:06 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 19:00:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22975 >/dev/null 2>/dev/null
selfserv with PID 22975 found at Tue Nov 27 19:00:06 EST 2012
selfserv with PID 22975 started at Tue Nov 27 19:00:06 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:06 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:00:07 EST 2012
ssl.sh: #2290: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22975 at Tue Nov 27 19:00:07 EST 2012
kill -USR1 22975
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22975 killed at Tue Nov 27 19:00:07 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:00:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23072 >/dev/null 2>/dev/null
selfserv with PID 23072 found at Tue Nov 27 19:00:07 EST 2012
selfserv with PID 23072 started at Tue Nov 27 19:00:07 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:07 EST 2012
ssl.sh: #2291: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 23072 at Tue Nov 27 19:00:07 EST 2012
kill -USR1 23072
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23072 killed at Tue Nov 27 19:00:07 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:00:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23147 >/dev/null 2>/dev/null
selfserv with PID 23147 found at Tue Nov 27 19:00:07 EST 2012
selfserv with PID 23147 started at Tue Nov 27 19:00:07 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:07 EST 2012
ssl.sh: #2292: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 23147 at Tue Nov 27 19:00:07 EST 2012
kill -USR1 23147
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23147 killed at Tue Nov 27 19:00:07 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:00:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23223 >/dev/null 2>/dev/null
selfserv with PID 23223 found at Tue Nov 27 19:00:07 EST 2012
selfserv with PID 23223 started at Tue Nov 27 19:00:07 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 10 -C :C004 -N -n TestUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:08 EST 2012
ssl.sh: #2293: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 23223 at Tue Nov 27 19:00:08 EST 2012
kill -USR1 23223
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23223 killed at Tue Nov 27 19:00:08 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:00:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23298 >/dev/null 2>/dev/null
selfserv with PID 23298 found at Tue Nov 27 19:00:08 EST 2012
selfserv with PID 23298 started at Tue Nov 27 19:00:08 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:08 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:08 EST 2012
ssl.sh: #2294: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 23298 at Tue Nov 27 19:00:08 EST 2012
kill -USR1 23298
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23298 killed at Tue Nov 27 19:00:08 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:00:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23373 >/dev/null 2>/dev/null
selfserv with PID 23373 found at Tue Nov 27 19:00:08 EST 2012
selfserv with PID 23373 started at Tue Nov 27 19:00:08 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C :C013 -n TestUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:08 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:08 EST 2012
ssl.sh: #2295: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 23373 at Tue Nov 27 19:00:08 EST 2012
kill -USR1 23373
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23373 killed at Tue Nov 27 19:00:08 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:00:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23449 >/dev/null 2>/dev/null
selfserv with PID 23449 found at Tue Nov 27 19:00:08 EST 2012
selfserv with PID 23449 started at Tue Nov 27 19:00:08 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:08 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:00:09 EST 2012
ssl.sh: #2296: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 23449 at Tue Nov 27 19:00:09 EST 2012
kill -USR1 23449
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23449 killed at Tue Nov 27 19:00:09 EST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server normal/client bypass - with ECC ===============================
selfserv starting at Tue Nov 27 19:00:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
selfserv with PID 23512 started at Tue Nov 27 19:00:09 EST 2012
ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2297: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2298: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2299: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2300: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2301: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2302: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2303: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2304: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2305: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2306: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2307: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2308: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2309: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2310: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2311: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2312: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2313: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2314: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2315: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2316: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2317: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2318: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2319: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2320: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2321: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2322: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2323: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2324: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2325: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2326: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2327: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2328: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2329: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2330: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2331: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2332: TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2333: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2334: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2335: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2336: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2337: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2338: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2339: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2340: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2341: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2342: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2343: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2344: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2345: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2346: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23512 at Tue Nov 27 19:00:13 EST 2012
kill -USR1 23512
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23512 killed at Tue Nov 27 19:00:13 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24931 >/dev/null 2>/dev/null
selfserv with PID 24931 found at Tue Nov 27 19:00:13 EST 2012
selfserv with PID 24931 started at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2347: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 24931 >/dev/null 2>/dev/null
selfserv with PID 24931 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2348: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24931 >/dev/null 2>/dev/null
selfserv with PID 24931 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2349: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24931 >/dev/null 2>/dev/null
selfserv with PID 24931 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2350: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24931 >/dev/null 2>/dev/null
selfserv with PID 24931 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2351: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 24931 at Tue Nov 27 19:00:13 EST 2012
kill -USR1 24931
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24931 killed at Tue Nov 27 19:00:13 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:13 EST 2012
selfserv with PID 25079 started at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2352: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2353: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2354: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2355: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2356: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2357: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2358: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2359: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2360: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2361: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2362: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2363: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2364: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2365: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2366: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 25079 at Tue Nov 27 19:00:15 EST 2012
kill -USR1 25079
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25079 killed at Tue Nov 27 19:00:15 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:15 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25478 >/dev/null 2>/dev/null
selfserv with PID 25478 found at Tue Nov 27 19:00:15 EST 2012
selfserv with PID 25478 started at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2367: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 25478 >/dev/null 2>/dev/null
selfserv with PID 25478 found at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2368: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25478 >/dev/null 2>/dev/null
selfserv with PID 25478 found at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2369: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25478 >/dev/null 2>/dev/null
selfserv with PID 25478 found at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2370: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25478 >/dev/null 2>/dev/null
selfserv with PID 25478 found at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2371: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 25478 at Tue Nov 27 19:00:15 EST 2012
kill -USR1 25478
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25478 killed at Tue Nov 27 19:00:15 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:15 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:15 EST 2012
selfserv with PID 25626 started at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2372: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2373: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2374: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2375: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2376: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2377: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2378: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2379: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2380: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2381: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2382: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2383: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2384: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2385: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2386: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 25626 at Tue Nov 27 19:00:17 EST 2012
kill -USR1 25626
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25626 killed at Tue Nov 27 19:00:17 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:17 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26011 >/dev/null 2>/dev/null
selfserv with PID 26011 found at Tue Nov 27 19:00:17 EST 2012
selfserv with PID 26011 started at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2387: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 26011 >/dev/null 2>/dev/null
selfserv with PID 26011 found at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2388: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 26011 >/dev/null 2>/dev/null
selfserv with PID 26011 found at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2389: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 26011 >/dev/null 2>/dev/null
selfserv with PID 26011 found at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2390: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 26011 >/dev/null 2>/dev/null
selfserv with PID 26011 found at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2391: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 26011 at Tue Nov 27 19:00:17 EST 2012
kill -USR1 26011
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26011 killed at Tue Nov 27 19:00:17 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:17 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26159 >/dev/null 2>/dev/null
selfserv with PID 26159 found at Tue Nov 27 19:00:17 EST 2012
selfserv with PID 26159 started at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2392: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 26159 >/dev/null 2>/dev/null
selfserv with PID 26159 found at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2393: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 26159 >/dev/null 2>/dev/null
selfserv with PID 26159 found at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2394: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 26159 >/dev/null 2>/dev/null
selfserv with PID 26159 found at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2395: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 26159 >/dev/null 2>/dev/null
selfserv with PID 26159 found at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2396: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26159 at Tue Nov 27 19:00:18 EST 2012
kill -USR1 26159
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26159 killed at Tue Nov 27 19:00:18 EST 2012
ssl.sh: SSL Client Authentication Extended Test - server normal/client bypass - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:18 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26358 >/dev/null 2>/dev/null
selfserv with PID 26358 found at Tue Nov 27 19:00:18 EST 2012
selfserv with PID 26358 started at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2397: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26358 at Tue Nov 27 19:00:18 EST 2012
kill -USR1 26358
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26358 killed at Tue Nov 27 19:00:18 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:00:18 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26415 >/dev/null 2>/dev/null
selfserv with PID 26415 found at Tue Nov 27 19:00:18 EST 2012
selfserv with PID 26415 started at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2398: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26415 at Tue Nov 27 19:00:18 EST 2012
kill -USR1 26415
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26415 killed at Tue Nov 27 19:00:18 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:00:18 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26472 >/dev/null 2>/dev/null
selfserv with PID 26472 found at Tue Nov 27 19:00:18 EST 2012
selfserv with PID 26472 started at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2399: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26472 at Tue Nov 27 19:00:19 EST 2012
kill -USR1 26472
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26472 killed at Tue Nov 27 19:00:19 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26529 >/dev/null 2>/dev/null
selfserv with PID 26529 found at Tue Nov 27 19:00:19 EST 2012
selfserv with PID 26529 started at Tue Nov 27 19:00:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2400: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26529 at Tue Nov 27 19:00:19 EST 2012
kill -USR1 26529
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26529 killed at Tue Nov 27 19:00:19 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:00:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26586 >/dev/null 2>/dev/null
selfserv with PID 26586 found at Tue Nov 27 19:00:19 EST 2012
selfserv with PID 26586 started at Tue Nov 27 19:00:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2401: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26586 at Tue Nov 27 19:00:19 EST 2012
kill -USR1 26586
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26586 killed at Tue Nov 27 19:00:19 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:00:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26643 >/dev/null 2>/dev/null
selfserv with PID 26643 found at Tue Nov 27 19:00:19 EST 2012
selfserv with PID 26643 started at Tue Nov 27 19:00:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2402: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26643 at Tue Nov 27 19:00:19 EST 2012
kill -USR1 26643
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26643 killed at Tue Nov 27 19:00:19 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26700 >/dev/null 2>/dev/null
selfserv with PID 26700 found at Tue Nov 27 19:00:19 EST 2012
selfserv with PID 26700 started at Tue Nov 27 19:00:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2403: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26700 at Tue Nov 27 19:00:20 EST 2012
kill -USR1 26700
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26700 killed at Tue Nov 27 19:00:20 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:00:20 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26757 >/dev/null 2>/dev/null
selfserv with PID 26757 found at Tue Nov 27 19:00:20 EST 2012
selfserv with PID 26757 started at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V :ssl3 -n ExtendedSSLUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2404: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26757 at Tue Nov 27 19:00:20 EST 2012
kill -USR1 26757
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26757 killed at Tue Nov 27 19:00:20 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:00:20 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26814 >/dev/null 2>/dev/null
selfserv with PID 26814 found at Tue Nov 27 19:00:20 EST 2012
selfserv with PID 26814 started at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V :ssl3 -n ExtendedSSLUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2405: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26814 at Tue Nov 27 19:00:20 EST 2012
kill -USR1 26814
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26814 killed at Tue Nov 27 19:00:20 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:20 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26871 >/dev/null 2>/dev/null
selfserv with PID 26871 found at Tue Nov 27 19:00:20 EST 2012
selfserv with PID 26871 started at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2406: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26871 at Tue Nov 27 19:00:20 EST 2012
kill -USR1 26871
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26871 killed at Tue Nov 27 19:00:20 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:00:20 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26928 >/dev/null 2>/dev/null
selfserv with PID 26928 found at Tue Nov 27 19:00:20 EST 2012
selfserv with PID 26928 started at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V :ssl3 -n ExtendedSSLUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2407: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26928 at Tue Nov 27 19:00:20 EST 2012
kill -USR1 26928
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26928 killed at Tue Nov 27 19:00:20 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:00:20 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26985 >/dev/null 2>/dev/null
selfserv with PID 26985 found at Tue Nov 27 19:00:20 EST 2012
selfserv with PID 26985 started at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V :ssl3 -n ExtendedSSLUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2408: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26985 at Tue Nov 27 19:00:21 EST 2012
kill -USR1 26985
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26985 killed at Tue Nov 27 19:00:21 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:21 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 19:00:21 EST 2012
selfserv with PID 27042 started at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2409: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27042 at Tue Nov 27 19:00:21 EST 2012
kill -USR1 27042
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27042 killed at Tue Nov 27 19:00:21 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:21 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27099 >/dev/null 2>/dev/null
selfserv with PID 27099 found at Tue Nov 27 19:00:21 EST 2012
selfserv with PID 27099 started at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3: -w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2410: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27099 at Tue Nov 27 19:00:21 EST 2012
kill -USR1 27099
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27099 killed at Tue Nov 27 19:00:21 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:21 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27156 >/dev/null 2>/dev/null
selfserv with PID 27156 found at Tue Nov 27 19:00:21 EST 2012
selfserv with PID 27156 started at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3: -w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2411: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27156 at Tue Nov 27 19:00:21 EST 2012
kill -USR1 27156
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27156 killed at Tue Nov 27 19:00:21 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:21 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27214 >/dev/null 2>/dev/null
selfserv with PID 27214 found at Tue Nov 27 19:00:21 EST 2012
selfserv with PID 27214 started at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2412: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27214 at Tue Nov 27 19:00:21 EST 2012
kill -USR1 27214
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27214 killed at Tue Nov 27 19:00:21 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:21 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27271 >/dev/null 2>/dev/null
selfserv with PID 27271 found at Tue Nov 27 19:00:22 EST 2012
selfserv with PID 27271 started at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3: -w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2413: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27271 at Tue Nov 27 19:00:22 EST 2012
kill -USR1 27271
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27271 killed at Tue Nov 27 19:00:22 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:22 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27328 >/dev/null 2>/dev/null
selfserv with PID 27328 found at Tue Nov 27 19:00:22 EST 2012
selfserv with PID 27328 started at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3: -w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2414: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27328 at Tue Nov 27 19:00:22 EST 2012
kill -USR1 27328
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27328 killed at Tue Nov 27 19:00:22 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:22 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27385 >/dev/null 2>/dev/null
selfserv with PID 27385 found at Tue Nov 27 19:00:22 EST 2012
selfserv with PID 27385 started at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2415: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27385 at Tue Nov 27 19:00:22 EST 2012
kill -USR1 27385
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27385 killed at Tue Nov 27 19:00:22 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:22 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27442 >/dev/null 2>/dev/null
selfserv with PID 27442 found at Tue Nov 27 19:00:22 EST 2012
selfserv with PID 27442 started at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2416: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27442 at Tue Nov 27 19:00:22 EST 2012
kill -USR1 27442
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27442 killed at Tue Nov 27 19:00:22 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:22 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27499 >/dev/null 2>/dev/null
selfserv with PID 27499 found at Tue Nov 27 19:00:22 EST 2012
selfserv with PID 27499 started at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2417: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27499 at Tue Nov 27 19:00:23 EST 2012
kill -USR1 27499
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27499 killed at Tue Nov 27 19:00:23 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:23 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27556 >/dev/null 2>/dev/null
selfserv with PID 27556 found at Tue Nov 27 19:00:23 EST 2012
selfserv with PID 27556 started at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2418: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27556 at Tue Nov 27 19:00:23 EST 2012
kill -USR1 27556
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27556 killed at Tue Nov 27 19:00:23 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:23 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27613 >/dev/null 2>/dev/null
selfserv with PID 27613 found at Tue Nov 27 19:00:23 EST 2012
selfserv with PID 27613 started at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2419: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27613 at Tue Nov 27 19:00:23 EST 2012
kill -USR1 27613
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27613 killed at Tue Nov 27 19:00:23 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:23 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27670 >/dev/null 2>/dev/null
selfserv with PID 27670 found at Tue Nov 27 19:00:23 EST 2012
selfserv with PID 27670 started at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2420: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27670 at Tue Nov 27 19:00:23 EST 2012
kill -USR1 27670
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27670 killed at Tue Nov 27 19:00:23 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:23 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27727 >/dev/null 2>/dev/null
selfserv with PID 27727 found at Tue Nov 27 19:00:23 EST 2012
selfserv with PID 27727 started at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2421: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27727 at Tue Nov 27 19:00:23 EST 2012
kill -USR1 27727
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27727 killed at Tue Nov 27 19:00:23 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:23 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27784 >/dev/null 2>/dev/null
selfserv with PID 27784 found at Tue Nov 27 19:00:23 EST 2012
selfserv with PID 27784 started at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2422: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27784 at Tue Nov 27 19:00:24 EST 2012
kill -USR1 27784
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27784 killed at Tue Nov 27 19:00:24 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:24 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27841 >/dev/null 2>/dev/null
selfserv with PID 27841 found at Tue Nov 27 19:00:24 EST 2012
selfserv with PID 27841 started at Tue Nov 27 19:00:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2423: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27841 at Tue Nov 27 19:00:24 EST 2012
kill -USR1 27841
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27841 killed at Tue Nov 27 19:00:24 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:24 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27898 >/dev/null 2>/dev/null
selfserv with PID 27898 found at Tue Nov 27 19:00:24 EST 2012
selfserv with PID 27898 started at Tue Nov 27 19:00:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2424: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27898 at Tue Nov 27 19:00:24 EST 2012
kill -USR1 27898
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27898 killed at Tue Nov 27 19:00:24 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:24 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27955 >/dev/null 2>/dev/null
selfserv with PID 27955 found at Tue Nov 27 19:00:24 EST 2012
selfserv with PID 27955 started at Tue Nov 27 19:00:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2425: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27955 at Tue Nov 27 19:00:24 EST 2012
kill -USR1 27955
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27955 killed at Tue Nov 27 19:00:24 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:24 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28012 >/dev/null 2>/dev/null
selfserv with PID 28012 found at Tue Nov 27 19:00:24 EST 2012
selfserv with PID 28012 started at Tue Nov 27 19:00:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2426: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28012 at Tue Nov 27 19:00:25 EST 2012
kill -USR1 28012
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28012 killed at Tue Nov 27 19:00:25 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:25 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28084 >/dev/null 2>/dev/null
selfserv with PID 28084 found at Tue Nov 27 19:00:25 EST 2012
selfserv with PID 28084 started at Tue Nov 27 19:00:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2427: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28084 at Tue Nov 27 19:00:25 EST 2012
kill -USR1 28084
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28084 killed at Tue Nov 27 19:00:25 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:25 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28141 >/dev/null 2>/dev/null
selfserv with PID 28141 found at Tue Nov 27 19:00:25 EST 2012
selfserv with PID 28141 started at Tue Nov 27 19:00:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2428: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28141 at Tue Nov 27 19:00:25 EST 2012
kill -USR1 28141
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28141 killed at Tue Nov 27 19:00:25 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:25 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28198 >/dev/null 2>/dev/null
selfserv with PID 28198 found at Tue Nov 27 19:00:25 EST 2012
selfserv with PID 28198 started at Tue Nov 27 19:00:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2429: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28198 at Tue Nov 27 19:00:25 EST 2012
kill -USR1 28198
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28198 killed at Tue Nov 27 19:00:25 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:25 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28255 >/dev/null 2>/dev/null
selfserv with PID 28255 found at Tue Nov 27 19:00:25 EST 2012
selfserv with PID 28255 started at Tue Nov 27 19:00:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2430: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28255 at Tue Nov 27 19:00:25 EST 2012
kill -USR1 28255
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28255 killed at Tue Nov 27 19:00:25 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:26 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28312 >/dev/null 2>/dev/null
selfserv with PID 28312 found at Tue Nov 27 19:00:26 EST 2012
selfserv with PID 28312 started at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V :ssl3 -n ExtendedSSLUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2431: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28312 at Tue Nov 27 19:00:26 EST 2012
kill -USR1 28312
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28312 killed at Tue Nov 27 19:00:26 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:26 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28369 >/dev/null 2>/dev/null
selfserv with PID 28369 found at Tue Nov 27 19:00:26 EST 2012
selfserv with PID 28369 started at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V :ssl3 -n ExtendedSSLUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2432: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28369 at Tue Nov 27 19:00:26 EST 2012
kill -USR1 28369
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28369 killed at Tue Nov 27 19:00:26 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:26 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28426 >/dev/null 2>/dev/null
selfserv with PID 28426 found at Tue Nov 27 19:00:26 EST 2012
selfserv with PID 28426 started at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V :ssl3 -n ExtendedSSLUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2433: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28426 at Tue Nov 27 19:00:26 EST 2012
kill -USR1 28426
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28426 killed at Tue Nov 27 19:00:26 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:26 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28483 >/dev/null 2>/dev/null
selfserv with PID 28483 found at Tue Nov 27 19:00:26 EST 2012
selfserv with PID 28483 started at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V :ssl3 -n ExtendedSSLUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2434: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28483 at Tue Nov 27 19:00:26 EST 2012
kill -USR1 28483
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28483 killed at Tue Nov 27 19:00:26 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:26 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28540 >/dev/null 2>/dev/null
selfserv with PID 28540 found at Tue Nov 27 19:00:26 EST 2012
selfserv with PID 28540 started at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3: -w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2435: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28540 at Tue Nov 27 19:00:27 EST 2012
kill -USR1 28540
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28540 killed at Tue Nov 27 19:00:27 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:27 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28597 >/dev/null 2>/dev/null
selfserv with PID 28597 found at Tue Nov 27 19:00:27 EST 2012
selfserv with PID 28597 started at Tue Nov 27 19:00:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3: -w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2436: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28597 at Tue Nov 27 19:00:27 EST 2012
kill -USR1 28597
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28597 killed at Tue Nov 27 19:00:27 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:27 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28654 >/dev/null 2>/dev/null
selfserv with PID 28654 found at Tue Nov 27 19:00:27 EST 2012
selfserv with PID 28654 started at Tue Nov 27 19:00:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3: -w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2437: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28654 at Tue Nov 27 19:00:27 EST 2012
kill -USR1 28654
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28654 killed at Tue Nov 27 19:00:27 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:27 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28711 >/dev/null 2>/dev/null
selfserv with PID 28711 found at Tue Nov 27 19:00:27 EST 2012
selfserv with PID 28711 started at Tue Nov 27 19:00:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3: -w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2438: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28711 at Tue Nov 27 19:00:27 EST 2012
kill -USR1 28711
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28711 killed at Tue Nov 27 19:00:27 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:27 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28768 >/dev/null 2>/dev/null
selfserv with PID 28768 found at Tue Nov 27 19:00:27 EST 2012
selfserv with PID 28768 started at Tue Nov 27 19:00:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2439: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28768 at Tue Nov 27 19:00:28 EST 2012
kill -USR1 28768
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28768 killed at Tue Nov 27 19:00:28 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:28 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28826 >/dev/null 2>/dev/null
selfserv with PID 28826 found at Tue Nov 27 19:00:28 EST 2012
selfserv with PID 28826 started at Tue Nov 27 19:00:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2440: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28826 at Tue Nov 27 19:00:28 EST 2012
kill -USR1 28826
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28826 killed at Tue Nov 27 19:00:28 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:28 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28883 >/dev/null 2>/dev/null
selfserv with PID 28883 found at Tue Nov 27 19:00:28 EST 2012
selfserv with PID 28883 started at Tue Nov 27 19:00:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2441: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28883 at Tue Nov 27 19:00:28 EST 2012
kill -USR1 28883
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28883 killed at Tue Nov 27 19:00:28 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:28 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28940 >/dev/null 2>/dev/null
selfserv with PID 28940 found at Tue Nov 27 19:00:28 EST 2012
selfserv with PID 28940 started at Tue Nov 27 19:00:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2442: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28940 at Tue Nov 27 19:00:28 EST 2012
kill -USR1 28940
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28940 killed at Tue Nov 27 19:00:28 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:28 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28997 >/dev/null 2>/dev/null
selfserv with PID 28997 found at Tue Nov 27 19:00:28 EST 2012
selfserv with PID 28997 started at Tue Nov 27 19:00:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2443: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28997 at Tue Nov 27 19:00:29 EST 2012
kill -USR1 28997
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28997 killed at Tue Nov 27 19:00:29 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:29 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29054 >/dev/null 2>/dev/null
selfserv with PID 29054 found at Tue Nov 27 19:00:29 EST 2012
selfserv with PID 29054 started at Tue Nov 27 19:00:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2444: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29054 at Tue Nov 27 19:00:29 EST 2012
kill -USR1 29054
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29054 killed at Tue Nov 27 19:00:29 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:29 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29111 >/dev/null 2>/dev/null
selfserv with PID 29111 found at Tue Nov 27 19:00:29 EST 2012
selfserv with PID 29111 started at Tue Nov 27 19:00:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2445: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29111 at Tue Nov 27 19:00:29 EST 2012
kill -USR1 29111
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29111 killed at Tue Nov 27 19:00:29 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:29 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29168 >/dev/null 2>/dev/null
selfserv with PID 29168 found at Tue Nov 27 19:00:29 EST 2012
selfserv with PID 29168 started at Tue Nov 27 19:00:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2446: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29168 at Tue Nov 27 19:00:29 EST 2012
kill -USR1 29168
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29168 killed at Tue Nov 27 19:00:29 EST 2012
ssl.sh: skipping TLS Server hello response without SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI for Extended Test
ssl.sh: skipping TLS Server response with alert for Extended Test
ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping TLS Server hello response without SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server normal/client bypass - with ECC ===============================
ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:00:30 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29339 >/dev/null 2>/dev/null
selfserv with PID 29339 found at Tue Nov 27 19:00:30 EST 2012
selfserv with PID 29339 started at Tue Nov 27 19:00:30 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:30 EST 2012
ssl.sh: #2447: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 29339 at Tue Nov 27 19:00:30 EST 2012
kill -USR1 29339
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29339 killed at Tue Nov 27 19:00:30 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:00:30 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29415 >/dev/null 2>/dev/null
selfserv with PID 29415 found at Tue Nov 27 19:00:30 EST 2012
selfserv with PID 29415 started at Tue Nov 27 19:00:30 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C c \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:30 EST 2012
ssl.sh: #2448: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 29415 at Tue Nov 27 19:00:30 EST 2012
kill -USR1 29415
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29415 killed at Tue Nov 27 19:00:30 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 19:00:30 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29491 >/dev/null 2>/dev/null
selfserv with PID 29491 found at Tue Nov 27 19:00:30 EST 2012
selfserv with PID 29491 started at Tue Nov 27 19:00:30 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C c -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:31 EST 2012
ssl.sh: #2449: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 29491 at Tue Nov 27 19:00:31 EST 2012
kill -USR1 29491
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29491 killed at Tue Nov 27 19:00:31 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 19:00:31 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29567 >/dev/null 2>/dev/null
selfserv with PID 29567 found at Tue Nov 27 19:00:31 EST 2012
selfserv with PID 29567 started at Tue Nov 27 19:00:31 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:31 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:00:31 EST 2012
ssl.sh: #2450: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 29567 at Tue Nov 27 19:00:31 EST 2012
kill -USR1 29567
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29567 killed at Tue Nov 27 19:00:31 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 19:00:31 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29643 >/dev/null 2>/dev/null
selfserv with PID 29643 found at Tue Nov 27 19:00:31 EST 2012
selfserv with PID 29643 started at Tue Nov 27 19:00:31 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:31 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:32 EST 2012
ssl.sh: #2451: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 29643 at Tue Nov 27 19:00:32 EST 2012
kill -USR1 29643
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29643 killed at Tue Nov 27 19:00:32 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 19:00:32 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29719 >/dev/null 2>/dev/null
selfserv with PID 29719 found at Tue Nov 27 19:00:32 EST 2012
selfserv with PID 29719 started at Tue Nov 27 19:00:32 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:00:32 EST 2012
ssl.sh: #2452: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 29719 at Tue Nov 27 19:00:32 EST 2012
kill -USR1 29719
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29719 killed at Tue Nov 27 19:00:32 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 19:00:32 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29795 >/dev/null 2>/dev/null
selfserv with PID 29795 found at Tue Nov 27 19:00:32 EST 2012
selfserv with PID 29795 started at Tue Nov 27 19:00:32 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:00:33 EST 2012
ssl.sh: #2453: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 29795 at Tue Nov 27 19:00:33 EST 2012
kill -USR1 29795
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29795 killed at Tue Nov 27 19:00:33 EST 2012
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:00:33 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29900 >/dev/null 2>/dev/null
selfserv with PID 29900 found at Tue Nov 27 19:00:33 EST 2012
selfserv with PID 29900 started at Tue Nov 27 19:00:33 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:33 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:34 EST 2012
ssl.sh: #2454: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 29900 at Tue Nov 27 19:00:34 EST 2012
kill -USR1 29900
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29900 killed at Tue Nov 27 19:00:34 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:00:34 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29975 >/dev/null 2>/dev/null
selfserv with PID 29975 found at Tue Nov 27 19:00:34 EST 2012
selfserv with PID 29975 started at Tue Nov 27 19:00:34 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:34 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:34 EST 2012
ssl.sh: #2455: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 29975 at Tue Nov 27 19:00:35 EST 2012
kill -USR1 29975
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29975 killed at Tue Nov 27 19:00:35 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:00:35 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30050 >/dev/null 2>/dev/null
selfserv with PID 30050 found at Tue Nov 27 19:00:35 EST 2012
selfserv with PID 30050 started at Tue Nov 27 19:00:35 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:00:35 EST 2012
ssl.sh: #2456: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 30050 at Tue Nov 27 19:00:35 EST 2012
kill -USR1 30050
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30050 killed at Tue Nov 27 19:00:35 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:00:35 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30126 >/dev/null 2>/dev/null
selfserv with PID 30126 found at Tue Nov 27 19:00:35 EST 2012
selfserv with PID 30126 started at Tue Nov 27 19:00:35 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:35 EST 2012
ssl.sh: #2457: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 30126 at Tue Nov 27 19:00:35 EST 2012
kill -USR1 30126
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30126 killed at Tue Nov 27 19:00:35 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:00:35 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30202 >/dev/null 2>/dev/null
selfserv with PID 30202 found at Tue Nov 27 19:00:35 EST 2012
selfserv with PID 30202 started at Tue Nov 27 19:00:35 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:35 EST 2012
ssl.sh: #2458: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 30202 at Tue Nov 27 19:00:35 EST 2012
kill -USR1 30202
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30202 killed at Tue Nov 27 19:00:35 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:00:35 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30278 >/dev/null 2>/dev/null
selfserv with PID 30278 found at Tue Nov 27 19:00:35 EST 2012
selfserv with PID 30278 started at Tue Nov 27 19:00:36 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:36 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:00:36 EST 2012
ssl.sh: #2459: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 30278 at Tue Nov 27 19:00:36 EST 2012
kill -USR1 30278
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30278 killed at Tue Nov 27 19:00:36 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:00:36 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30355 >/dev/null 2>/dev/null
selfserv with PID 30355 found at Tue Nov 27 19:00:36 EST 2012
selfserv with PID 30355 started at Tue Nov 27 19:00:36 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:36 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:00:36 EST 2012
ssl.sh: #2460: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 30355 at Tue Nov 27 19:00:36 EST 2012
kill -USR1 30355
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30355 killed at Tue Nov 27 19:00:36 EST 2012
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:00:36 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30460 >/dev/null 2>/dev/null
selfserv with PID 30460 found at Tue Nov 27 19:00:36 EST 2012
selfserv with PID 30460 started at Tue Nov 27 19:00:36 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:36 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:37 EST 2012
ssl.sh: #2461: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 30460 at Tue Nov 27 19:00:37 EST 2012
kill -USR1 30460
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30460 killed at Tue Nov 27 19:00:37 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:00:37 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30535 >/dev/null 2>/dev/null
selfserv with PID 30535 found at Tue Nov 27 19:00:37 EST 2012
selfserv with PID 30535 started at Tue Nov 27 19:00:37 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:37 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:38 EST 2012
ssl.sh: #2462: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 30535 at Tue Nov 27 19:00:38 EST 2012
kill -USR1 30535
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30535 killed at Tue Nov 27 19:00:38 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:00:38 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30611 >/dev/null 2>/dev/null
selfserv with PID 30611 found at Tue Nov 27 19:00:38 EST 2012
selfserv with PID 30611 started at Tue Nov 27 19:00:38 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:38 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:39 EST 2012
ssl.sh: #2463: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 30611 at Tue Nov 27 19:00:39 EST 2012
kill -USR1 30611
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30611 killed at Tue Nov 27 19:00:39 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:00:39 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30686 >/dev/null 2>/dev/null
selfserv with PID 30686 found at Tue Nov 27 19:00:39 EST 2012
selfserv with PID 30686 started at Tue Nov 27 19:00:39 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:39 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:39 EST 2012
ssl.sh: #2464: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 30686 at Tue Nov 27 19:00:39 EST 2012
kill -USR1 30686
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30686 killed at Tue Nov 27 19:00:39 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:00:40 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30761 >/dev/null 2>/dev/null
selfserv with PID 30761 found at Tue Nov 27 19:00:40 EST 2012
selfserv with PID 30761 started at Tue Nov 27 19:00:40 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:40 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:40 EST 2012
ssl.sh: #2465: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 30761 at Tue Nov 27 19:00:40 EST 2012
kill -USR1 30761
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30761 killed at Tue Nov 27 19:00:40 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 19:00:40 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30837 >/dev/null 2>/dev/null
selfserv with PID 30837 found at Tue Nov 27 19:00:40 EST 2012
selfserv with PID 30837 started at Tue Nov 27 19:00:40 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:40 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:00:40 EST 2012
ssl.sh: #2466: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 30837 at Tue Nov 27 19:00:40 EST 2012
kill -USR1 30837
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30837 killed at Tue Nov 27 19:00:40 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:00:41 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30934 >/dev/null 2>/dev/null
selfserv with PID 30934 found at Tue Nov 27 19:00:41 EST 2012
selfserv with PID 30934 started at Tue Nov 27 19:00:41 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:41 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:41 EST 2012
ssl.sh: #2467: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 30934 at Tue Nov 27 19:00:41 EST 2012
kill -USR1 30934
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30934 killed at Tue Nov 27 19:00:41 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:00:41 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31009 >/dev/null 2>/dev/null
selfserv with PID 31009 found at Tue Nov 27 19:00:41 EST 2012
selfserv with PID 31009 started at Tue Nov 27 19:00:41 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:41 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:41 EST 2012
ssl.sh: #2468: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 31009 at Tue Nov 27 19:00:41 EST 2012
kill -USR1 31009
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31009 killed at Tue Nov 27 19:00:41 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:00:41 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31085 >/dev/null 2>/dev/null
selfserv with PID 31085 found at Tue Nov 27 19:00:41 EST 2012
selfserv with PID 31085 started at Tue Nov 27 19:00:41 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:41 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:42 EST 2012
ssl.sh: #2469: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 31085 at Tue Nov 27 19:00:42 EST 2012
kill -USR1 31085
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31085 killed at Tue Nov 27 19:00:42 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:00:42 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31160 >/dev/null 2>/dev/null
selfserv with PID 31160 found at Tue Nov 27 19:00:42 EST 2012
selfserv with PID 31160 started at Tue Nov 27 19:00:42 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:42 EST 2012
ssl.sh: #2470: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 31160 at Tue Nov 27 19:00:42 EST 2012
kill -USR1 31160
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31160 killed at Tue Nov 27 19:00:42 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:00:42 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31235 >/dev/null 2>/dev/null
selfserv with PID 31235 found at Tue Nov 27 19:00:42 EST 2012
selfserv with PID 31235 started at Tue Nov 27 19:00:42 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:42 EST 2012
ssl.sh: #2471: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 31235 at Tue Nov 27 19:00:42 EST 2012
kill -USR1 31235
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31235 killed at Tue Nov 27 19:00:42 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:00:42 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31311 >/dev/null 2>/dev/null
selfserv with PID 31311 found at Tue Nov 27 19:00:42 EST 2012
selfserv with PID 31311 started at Tue Nov 27 19:00:42 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:00:43 EST 2012
ssl.sh: #2472: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 31311 at Tue Nov 27 19:00:43 EST 2012
kill -USR1 31311
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31311 killed at Tue Nov 27 19:00:43 EST 2012
ssl.sh: SSL - FIPS mode on for server ===============================
ssl.sh: Turning FIPS on for the server
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -fips true -force
FIPS mode enabled.
ssl.sh: #2473: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -list
ssl.sh: #2474: (modutil -list) produced a returncode of 0, expected is 0 - PASSED
1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2475: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: Turning FIPS on for the extended server
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -fips true -force
FIPS mode enabled.
ssl.sh: #2476: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -list
ssl.sh: #2477: (modutil -list) produced a returncode of 0, expected is 0 - PASSED
1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2478: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: SSL Cipher Coverage - server fips/client normal - with ECC ===============================
selfserv starting at Tue Nov 27 19:00:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
selfserv with PID 31442 started at Tue Nov 27 19:00:44 EST 2012
ssl.sh: skipping SSL2_RC4_128_WITH_MD5 (non-FIPS only)
ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2479: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2480: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2481: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2482: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2483: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2484: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2485: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2486: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2487: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2488: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2489: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2490: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2491: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2492: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2493: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2494: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2495: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2496: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2497: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2498: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2499: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2500: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2501: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2502: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2503: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2504: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2505: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2506: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2507: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2508: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2509: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2510: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2511: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2512: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2513: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2514: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2515: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2516: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2517: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2518: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31442 at Tue Nov 27 19:00:46 EST 2012
kill -USR1 31442
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31442 killed at Tue Nov 27 19:00:46 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32666 >/dev/null 2>/dev/null
selfserv with PID 32666 found at Tue Nov 27 19:00:47 EST 2012
selfserv with PID 32666 started at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2519: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32666 >/dev/null 2>/dev/null
selfserv with PID 32666 found at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2520: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32666 >/dev/null 2>/dev/null
selfserv with PID 32666 found at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2521: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32666 >/dev/null 2>/dev/null
selfserv with PID 32666 found at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2522: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32666 >/dev/null 2>/dev/null
selfserv with PID 32666 found at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2523: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32666 at Tue Nov 27 19:00:47 EST 2012
kill -USR1 32666
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32666 killed at Tue Nov 27 19:00:47 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:47 EST 2012
selfserv with PID 351 started at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2524: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2525: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2526: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2527: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2528: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2529: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2530: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2531: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2532: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2533: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2534: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2535: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2536: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2537: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2538: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 351 at Tue Nov 27 19:00:49 EST 2012
kill -USR1 351
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 351 killed at Tue Nov 27 19:00:49 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 803 >/dev/null 2>/dev/null
selfserv with PID 803 found at Tue Nov 27 19:00:49 EST 2012
selfserv with PID 803 started at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2539: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 803 >/dev/null 2>/dev/null
selfserv with PID 803 found at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2540: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 803 >/dev/null 2>/dev/null
selfserv with PID 803 found at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2541: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 803 >/dev/null 2>/dev/null
selfserv with PID 803 found at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2542: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 803 >/dev/null 2>/dev/null
selfserv with PID 803 found at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2543: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 803 at Tue Nov 27 19:00:49 EST 2012
kill -USR1 803
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 803 killed at Tue Nov 27 19:00:49 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:49 EST 2012
selfserv with PID 1007 started at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2544: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2545: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2546: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2547: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2548: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2549: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2550: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2551: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2552: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2553: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2554: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2555: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2556: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2557: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2558: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 1007 at Tue Nov 27 19:00:51 EST 2012
kill -USR1 1007
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1007 killed at Tue Nov 27 19:00:51 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1392 >/dev/null 2>/dev/null
selfserv with PID 1392 found at Tue Nov 27 19:00:51 EST 2012
selfserv with PID 1392 started at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2559: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 1392 >/dev/null 2>/dev/null
selfserv with PID 1392 found at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2560: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1392 >/dev/null 2>/dev/null
selfserv with PID 1392 found at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2561: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1392 >/dev/null 2>/dev/null
selfserv with PID 1392 found at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2562: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1392 >/dev/null 2>/dev/null
selfserv with PID 1392 found at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2563: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 1392 at Tue Nov 27 19:00:52 EST 2012
kill -USR1 1392
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1392 killed at Tue Nov 27 19:00:52 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1541 >/dev/null 2>/dev/null
selfserv with PID 1541 found at Tue Nov 27 19:00:52 EST 2012
selfserv with PID 1541 started at Tue Nov 27 19:00:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2564: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 1541 >/dev/null 2>/dev/null
selfserv with PID 1541 found at Tue Nov 27 19:00:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2565: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1541 >/dev/null 2>/dev/null
selfserv with PID 1541 found at Tue Nov 27 19:00:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2566: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1541 >/dev/null 2>/dev/null
selfserv with PID 1541 found at Tue Nov 27 19:00:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2567: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1541 >/dev/null 2>/dev/null
selfserv with PID 1541 found at Tue Nov 27 19:00:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2568: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1541 at Tue Nov 27 19:00:52 EST 2012
kill -USR1 1541
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1541 killed at Tue Nov 27 19:00:52 EST 2012
ssl.sh: SSL Client Authentication - server fips/client normal - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1740 >/dev/null 2>/dev/null
selfserv with PID 1740 found at Tue Nov 27 19:00:52 EST 2012
selfserv with PID 1740 started at Tue Nov 27 19:00:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2569: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1740 at Tue Nov 27 19:00:53 EST 2012
kill -USR1 1740
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1740 killed at Tue Nov 27 19:00:53 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:00:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1797 >/dev/null 2>/dev/null
selfserv with PID 1797 found at Tue Nov 27 19:00:53 EST 2012
selfserv with PID 1797 started at Tue Nov 27 19:00:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2570: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1797 at Tue Nov 27 19:00:53 EST 2012
kill -USR1 1797
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1797 killed at Tue Nov 27 19:00:53 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:00:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1854 >/dev/null 2>/dev/null
selfserv with PID 1854 found at Tue Nov 27 19:00:53 EST 2012
selfserv with PID 1854 started at Tue Nov 27 19:00:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2571: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1854 at Tue Nov 27 19:00:53 EST 2012
kill -USR1 1854
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1854 killed at Tue Nov 27 19:00:53 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1911 >/dev/null 2>/dev/null
selfserv with PID 1911 found at Tue Nov 27 19:00:53 EST 2012
selfserv with PID 1911 started at Tue Nov 27 19:00:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2572: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1911 at Tue Nov 27 19:00:54 EST 2012
kill -USR1 1911
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1911 killed at Tue Nov 27 19:00:54 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:00:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1968 >/dev/null 2>/dev/null
selfserv with PID 1968 found at Tue Nov 27 19:00:54 EST 2012
selfserv with PID 1968 started at Tue Nov 27 19:00:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2573: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1968 at Tue Nov 27 19:00:54 EST 2012
kill -USR1 1968
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1968 killed at Tue Nov 27 19:00:54 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:00:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2025 >/dev/null 2>/dev/null
selfserv with PID 2025 found at Tue Nov 27 19:00:54 EST 2012
selfserv with PID 2025 started at Tue Nov 27 19:00:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2574: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2025 at Tue Nov 27 19:00:54 EST 2012
kill -USR1 2025
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2025 killed at Tue Nov 27 19:00:54 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2082 >/dev/null 2>/dev/null
selfserv with PID 2082 found at Tue Nov 27 19:00:54 EST 2012
selfserv with PID 2082 started at Tue Nov 27 19:00:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2575: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2082 at Tue Nov 27 19:00:55 EST 2012
kill -USR1 2082
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2082 killed at Tue Nov 27 19:00:55 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:00:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2139 >/dev/null 2>/dev/null
selfserv with PID 2139 found at Tue Nov 27 19:00:55 EST 2012
selfserv with PID 2139 started at Tue Nov 27 19:00:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2576: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2139 at Tue Nov 27 19:00:55 EST 2012
kill -USR1 2139
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2139 killed at Tue Nov 27 19:00:55 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:00:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2197 >/dev/null 2>/dev/null
selfserv with PID 2197 found at Tue Nov 27 19:00:55 EST 2012
selfserv with PID 2197 started at Tue Nov 27 19:00:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2577: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2197 at Tue Nov 27 19:00:55 EST 2012
kill -USR1 2197
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2197 killed at Tue Nov 27 19:00:55 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2254 >/dev/null 2>/dev/null
selfserv with PID 2254 found at Tue Nov 27 19:00:55 EST 2012
selfserv with PID 2254 started at Tue Nov 27 19:00:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2578: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2254 at Tue Nov 27 19:00:55 EST 2012
kill -USR1 2254
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2254 killed at Tue Nov 27 19:00:55 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:00:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2311 >/dev/null 2>/dev/null
selfserv with PID 2311 found at Tue Nov 27 19:00:56 EST 2012
selfserv with PID 2311 started at Tue Nov 27 19:00:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2579: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2311 at Tue Nov 27 19:00:56 EST 2012
kill -USR1 2311
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2311 killed at Tue Nov 27 19:00:56 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:00:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2368 >/dev/null 2>/dev/null
selfserv with PID 2368 found at Tue Nov 27 19:00:56 EST 2012
selfserv with PID 2368 started at Tue Nov 27 19:00:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2580: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2368 at Tue Nov 27 19:00:56 EST 2012
kill -USR1 2368
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2368 killed at Tue Nov 27 19:00:56 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2425 >/dev/null 2>/dev/null
selfserv with PID 2425 found at Tue Nov 27 19:00:56 EST 2012
selfserv with PID 2425 started at Tue Nov 27 19:00:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2581: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2425 at Tue Nov 27 19:00:56 EST 2012
kill -USR1 2425
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2425 killed at Tue Nov 27 19:00:56 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2482 >/dev/null 2>/dev/null
selfserv with PID 2482 found at Tue Nov 27 19:00:56 EST 2012
selfserv with PID 2482 started at Tue Nov 27 19:00:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2582: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2482 at Tue Nov 27 19:00:57 EST 2012
kill -USR1 2482
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2482 killed at Tue Nov 27 19:00:57 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2539 >/dev/null 2>/dev/null
selfserv with PID 2539 found at Tue Nov 27 19:00:57 EST 2012
selfserv with PID 2539 started at Tue Nov 27 19:00:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2583: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2539 at Tue Nov 27 19:00:57 EST 2012
kill -USR1 2539
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2539 killed at Tue Nov 27 19:00:57 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2596 >/dev/null 2>/dev/null
selfserv with PID 2596 found at Tue Nov 27 19:00:57 EST 2012
selfserv with PID 2596 started at Tue Nov 27 19:00:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2584: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2596 at Tue Nov 27 19:00:57 EST 2012
kill -USR1 2596
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2596 killed at Tue Nov 27 19:00:57 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2653 >/dev/null 2>/dev/null
selfserv with PID 2653 found at Tue Nov 27 19:00:57 EST 2012
selfserv with PID 2653 started at Tue Nov 27 19:00:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2585: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2653 at Tue Nov 27 19:00:58 EST 2012
kill -USR1 2653
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2653 killed at Tue Nov 27 19:00:58 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2711 >/dev/null 2>/dev/null
selfserv with PID 2711 found at Tue Nov 27 19:00:58 EST 2012
selfserv with PID 2711 started at Tue Nov 27 19:00:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2586: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2711 at Tue Nov 27 19:00:58 EST 2012
kill -USR1 2711
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2711 killed at Tue Nov 27 19:00:58 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2768 >/dev/null 2>/dev/null
selfserv with PID 2768 found at Tue Nov 27 19:00:58 EST 2012
selfserv with PID 2768 started at Tue Nov 27 19:00:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2587: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2768 at Tue Nov 27 19:00:58 EST 2012
kill -USR1 2768
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2768 killed at Tue Nov 27 19:00:58 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2825 >/dev/null 2>/dev/null
selfserv with PID 2825 found at Tue Nov 27 19:00:58 EST 2012
selfserv with PID 2825 started at Tue Nov 27 19:00:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2588: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2825 at Tue Nov 27 19:00:59 EST 2012
kill -USR1 2825
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2825 killed at Tue Nov 27 19:00:59 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2882 >/dev/null 2>/dev/null
selfserv with PID 2882 found at Tue Nov 27 19:00:59 EST 2012
selfserv with PID 2882 started at Tue Nov 27 19:00:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2589: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2882 at Tue Nov 27 19:00:59 EST 2012
kill -USR1 2882
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2882 killed at Tue Nov 27 19:00:59 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2939 >/dev/null 2>/dev/null
selfserv with PID 2939 found at Tue Nov 27 19:00:59 EST 2012
selfserv with PID 2939 started at Tue Nov 27 19:00:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2590: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2939 at Tue Nov 27 19:00:59 EST 2012
kill -USR1 2939
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2939 killed at Tue Nov 27 19:00:59 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:00:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2996 >/dev/null 2>/dev/null
selfserv with PID 2996 found at Tue Nov 27 19:00:59 EST 2012
selfserv with PID 2996 started at Tue Nov 27 19:00:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2591: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2996 at Tue Nov 27 19:01:00 EST 2012
kill -USR1 2996
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2996 killed at Tue Nov 27 19:01:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3053 >/dev/null 2>/dev/null
selfserv with PID 3053 found at Tue Nov 27 19:01:00 EST 2012
selfserv with PID 3053 started at Tue Nov 27 19:01:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2592: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3053 at Tue Nov 27 19:01:00 EST 2012
kill -USR1 3053
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3053 killed at Tue Nov 27 19:01:00 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3110 >/dev/null 2>/dev/null
selfserv with PID 3110 found at Tue Nov 27 19:01:00 EST 2012
selfserv with PID 3110 started at Tue Nov 27 19:01:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2593: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3110 at Tue Nov 27 19:01:00 EST 2012
kill -USR1 3110
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3110 killed at Tue Nov 27 19:01:00 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:01:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3167 >/dev/null 2>/dev/null
selfserv with PID 3167 found at Tue Nov 27 19:01:00 EST 2012
selfserv with PID 3167 started at Tue Nov 27 19:01:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2594: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3167 at Tue Nov 27 19:01:01 EST 2012
kill -USR1 3167
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3167 killed at Tue Nov 27 19:01:01 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3244 >/dev/null 2>/dev/null
selfserv with PID 3244 found at Tue Nov 27 19:01:01 EST 2012
selfserv with PID 3244 started at Tue Nov 27 19:01:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2595: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3244 at Tue Nov 27 19:01:01 EST 2012
kill -USR1 3244
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3244 killed at Tue Nov 27 19:01:01 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3302 >/dev/null 2>/dev/null
selfserv with PID 3302 found at Tue Nov 27 19:01:01 EST 2012
selfserv with PID 3302 started at Tue Nov 27 19:01:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2596: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3302 at Tue Nov 27 19:01:01 EST 2012
kill -USR1 3302
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3302 killed at Tue Nov 27 19:01:01 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:01:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3359 >/dev/null 2>/dev/null
selfserv with PID 3359 found at Tue Nov 27 19:01:01 EST 2012
selfserv with PID 3359 started at Tue Nov 27 19:01:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2597: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3359 at Tue Nov 27 19:01:02 EST 2012
kill -USR1 3359
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3359 killed at Tue Nov 27 19:01:02 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3416 >/dev/null 2>/dev/null
selfserv with PID 3416 found at Tue Nov 27 19:01:02 EST 2012
selfserv with PID 3416 started at Tue Nov 27 19:01:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2598: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3416 at Tue Nov 27 19:01:02 EST 2012
kill -USR1 3416
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3416 killed at Tue Nov 27 19:01:02 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3488 >/dev/null 2>/dev/null
selfserv with PID 3488 found at Tue Nov 27 19:01:02 EST 2012
selfserv with PID 3488 started at Tue Nov 27 19:01:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2599: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3488 at Tue Nov 27 19:01:02 EST 2012
kill -USR1 3488
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3488 killed at Tue Nov 27 19:01:02 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3545 >/dev/null 2>/dev/null
selfserv with PID 3545 found at Tue Nov 27 19:01:02 EST 2012
selfserv with PID 3545 started at Tue Nov 27 19:01:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2600: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3545 at Tue Nov 27 19:01:03 EST 2012
kill -USR1 3545
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3545 killed at Tue Nov 27 19:01:03 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3602 >/dev/null 2>/dev/null
selfserv with PID 3602 found at Tue Nov 27 19:01:03 EST 2012
selfserv with PID 3602 started at Tue Nov 27 19:01:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2601: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3602 at Tue Nov 27 19:01:03 EST 2012
kill -USR1 3602
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3602 killed at Tue Nov 27 19:01:03 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3659 >/dev/null 2>/dev/null
selfserv with PID 3659 found at Tue Nov 27 19:01:03 EST 2012
selfserv with PID 3659 started at Tue Nov 27 19:01:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2602: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3659 at Tue Nov 27 19:01:03 EST 2012
kill -USR1 3659
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3659 killed at Tue Nov 27 19:01:03 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3716 >/dev/null 2>/dev/null
selfserv with PID 3716 found at Tue Nov 27 19:01:04 EST 2012
selfserv with PID 3716 started at Tue Nov 27 19:01:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2603: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3716 at Tue Nov 27 19:01:04 EST 2012
kill -USR1 3716
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3716 killed at Tue Nov 27 19:01:04 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3773 >/dev/null 2>/dev/null
selfserv with PID 3773 found at Tue Nov 27 19:01:04 EST 2012
selfserv with PID 3773 started at Tue Nov 27 19:01:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2604: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3773 at Tue Nov 27 19:01:04 EST 2012
kill -USR1 3773
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3773 killed at Tue Nov 27 19:01:04 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3830 >/dev/null 2>/dev/null
selfserv with PID 3830 found at Tue Nov 27 19:01:04 EST 2012
selfserv with PID 3830 started at Tue Nov 27 19:01:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2605: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3830 at Tue Nov 27 19:01:05 EST 2012
kill -USR1 3830
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3830 killed at Tue Nov 27 19:01:05 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3887 >/dev/null 2>/dev/null
selfserv with PID 3887 found at Tue Nov 27 19:01:05 EST 2012
selfserv with PID 3887 started at Tue Nov 27 19:01:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2606: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3887 at Tue Nov 27 19:01:05 EST 2012
kill -USR1 3887
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3887 killed at Tue Nov 27 19:01:05 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3944 >/dev/null 2>/dev/null
selfserv with PID 3944 found at Tue Nov 27 19:01:05 EST 2012
selfserv with PID 3944 started at Tue Nov 27 19:01:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2607: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3944 at Tue Nov 27 19:01:05 EST 2012
kill -USR1 3944
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3944 killed at Tue Nov 27 19:01:05 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4001 >/dev/null 2>/dev/null
selfserv with PID 4001 found at Tue Nov 27 19:01:05 EST 2012
selfserv with PID 4001 started at Tue Nov 27 19:01:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2608: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4001 at Tue Nov 27 19:01:05 EST 2012
kill -USR1 4001
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4001 killed at Tue Nov 27 19:01:06 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4058 >/dev/null 2>/dev/null
selfserv with PID 4058 found at Tue Nov 27 19:01:06 EST 2012
selfserv with PID 4058 started at Tue Nov 27 19:01:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2609: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4058 at Tue Nov 27 19:01:06 EST 2012
kill -USR1 4058
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4058 killed at Tue Nov 27 19:01:06 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4115 >/dev/null 2>/dev/null
selfserv with PID 4115 found at Tue Nov 27 19:01:06 EST 2012
selfserv with PID 4115 started at Tue Nov 27 19:01:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2610: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4115 at Tue Nov 27 19:01:06 EST 2012
kill -USR1 4115
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4115 killed at Tue Nov 27 19:01:06 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4172 >/dev/null 2>/dev/null
selfserv with PID 4172 found at Tue Nov 27 19:01:06 EST 2012
selfserv with PID 4172 started at Tue Nov 27 19:01:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2611: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4172 at Tue Nov 27 19:01:07 EST 2012
kill -USR1 4172
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4172 killed at Tue Nov 27 19:01:07 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4229 >/dev/null 2>/dev/null
selfserv with PID 4229 found at Tue Nov 27 19:01:07 EST 2012
selfserv with PID 4229 started at Tue Nov 27 19:01:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2612: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4229 at Tue Nov 27 19:01:07 EST 2012
kill -USR1 4229
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4229 killed at Tue Nov 27 19:01:07 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4286 >/dev/null 2>/dev/null
selfserv with PID 4286 found at Tue Nov 27 19:01:07 EST 2012
selfserv with PID 4286 started at Tue Nov 27 19:01:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2613: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4286 at Tue Nov 27 19:01:07 EST 2012
kill -USR1 4286
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4286 killed at Tue Nov 27 19:01:07 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4343 >/dev/null 2>/dev/null
selfserv with PID 4343 found at Tue Nov 27 19:01:07 EST 2012
selfserv with PID 4343 started at Tue Nov 27 19:01:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4343 at Tue Nov 27 19:01:08 EST 2012
kill -USR1 4343
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4343 killed at Tue Nov 27 19:01:08 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4401 >/dev/null 2>/dev/null
selfserv with PID 4401 found at Tue Nov 27 19:01:08 EST 2012
selfserv with PID 4401 started at Tue Nov 27 19:01:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2615: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4401 at Tue Nov 27 19:01:08 EST 2012
kill -USR1 4401
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4401 killed at Tue Nov 27 19:01:08 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4458 >/dev/null 2>/dev/null
selfserv with PID 4458 found at Tue Nov 27 19:01:08 EST 2012
selfserv with PID 4458 started at Tue Nov 27 19:01:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2616: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4458 at Tue Nov 27 19:01:08 EST 2012
kill -USR1 4458
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4458 killed at Tue Nov 27 19:01:08 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4515 >/dev/null 2>/dev/null
selfserv with PID 4515 found at Tue Nov 27 19:01:08 EST 2012
selfserv with PID 4515 started at Tue Nov 27 19:01:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2617: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4515 at Tue Nov 27 19:01:09 EST 2012
kill -USR1 4515
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4515 killed at Tue Nov 27 19:01:09 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4572 >/dev/null 2>/dev/null
selfserv with PID 4572 found at Tue Nov 27 19:01:09 EST 2012
selfserv with PID 4572 started at Tue Nov 27 19:01:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2618: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4572 at Tue Nov 27 19:01:09 EST 2012
kill -USR1 4572
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4572 killed at Tue Nov 27 19:01:09 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 19:01:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4650 >/dev/null 2>/dev/null
selfserv with PID 4650 found at Tue Nov 27 19:01:09 EST 2012
selfserv with PID 4650 started at Tue Nov 27 19:01:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2619: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4650 at Tue Nov 27 19:01:09 EST 2012
kill -USR1 4650
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4650 killed at Tue Nov 27 19:01:09 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 19:01:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4713 >/dev/null 2>/dev/null
selfserv with PID 4713 found at Tue Nov 27 19:01:09 EST 2012
selfserv with PID 4713 started at Tue Nov 27 19:01:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2620: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4713 at Tue Nov 27 19:01:10 EST 2012
kill -USR1 4713
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4713 killed at Tue Nov 27 19:01:10 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 19:01:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4776 >/dev/null 2>/dev/null
selfserv with PID 4776 found at Tue Nov 27 19:01:10 EST 2012
selfserv with PID 4776 started at Tue Nov 27 19:01:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2621: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4776 at Tue Nov 27 19:01:10 EST 2012
kill -USR1 4776
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4776 killed at Tue Nov 27 19:01:10 EST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Tue Nov 27 19:01:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4839 >/dev/null 2>/dev/null
selfserv with PID 4839 found at Tue Nov 27 19:01:10 EST 2012
selfserv with PID 4839 started at Tue Nov 27 19:01:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2622: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4839 at Tue Nov 27 19:01:10 EST 2012
kill -USR1 4839
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4839 killed at Tue Nov 27 19:01:10 EST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Tue Nov 27 19:01:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4902 >/dev/null 2>/dev/null
selfserv with PID 4902 found at Tue Nov 27 19:01:10 EST 2012
selfserv with PID 4902 started at Tue Nov 27 19:01:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2623: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4902 at Tue Nov 27 19:01:11 EST 2012
kill -USR1 4902
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4902 killed at Tue Nov 27 19:01:11 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 19:01:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4966 >/dev/null 2>/dev/null
selfserv with PID 4966 found at Tue Nov 27 19:01:11 EST 2012
selfserv with PID 4966 started at Tue Nov 27 19:01:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2624: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4966 at Tue Nov 27 19:01:11 EST 2012
kill -USR1 4966
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4966 killed at Tue Nov 27 19:01:11 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 19:01:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5029 >/dev/null 2>/dev/null
selfserv with PID 5029 found at Tue Nov 27 19:01:11 EST 2012
selfserv with PID 5029 started at Tue Nov 27 19:01:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2625: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5029 at Tue Nov 27 19:01:11 EST 2012
kill -USR1 5029
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5029 killed at Tue Nov 27 19:01:11 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Tue Nov 27 19:01:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5092 >/dev/null 2>/dev/null
selfserv with PID 5092 found at Tue Nov 27 19:01:11 EST 2012
selfserv with PID 5092 started at Tue Nov 27 19:01:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #2626: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5092 at Tue Nov 27 19:01:12 EST 2012
kill -USR1 5092
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5092 killed at Tue Nov 27 19:01:12 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Tue Nov 27 19:01:12 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5155 >/dev/null 2>/dev/null
selfserv with PID 5155 found at Tue Nov 27 19:01:12 EST 2012
selfserv with PID 5155 started at Tue Nov 27 19:01:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02-sni1.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2627: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5155 at Tue Nov 27 19:01:12 EST 2012
kill -USR1 5155
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5155 killed at Tue Nov 27 19:01:12 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 19:01:12 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5218 >/dev/null 2>/dev/null
selfserv with PID 5218 found at Tue Nov 27 19:01:12 EST 2012
selfserv with PID 5218 started at Tue Nov 27 19:01:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2628: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5218 at Tue Nov 27 19:01:12 EST 2012
kill -USR1 5218
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5218 killed at Tue Nov 27 19:01:12 EST 2012
ssl.sh: SSL Stress Test - server fips/client normal - with ECC ===============================
ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:01:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5355 >/dev/null 2>/dev/null
selfserv with PID 5355 found at Tue Nov 27 19:01:13 EST 2012
selfserv with PID 5355 started at Tue Nov 27 19:01:13 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 1000 -C c -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:13 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:13 EST 2012
ssl.sh: #2629: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5355 at Tue Nov 27 19:01:13 EST 2012
kill -USR1 5355
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5355 killed at Tue Nov 27 19:01:13 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:01:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5431 >/dev/null 2>/dev/null
selfserv with PID 5431 found at Tue Nov 27 19:01:13 EST 2012
selfserv with PID 5431 started at Tue Nov 27 19:01:13 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 1000 -C c \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:13 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:14 EST 2012
ssl.sh: #2630: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5431 at Tue Nov 27 19:01:14 EST 2012
kill -USR1 5431
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5431 killed at Tue Nov 27 19:01:14 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 19:01:14 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5507 >/dev/null 2>/dev/null
selfserv with PID 5507 found at Tue Nov 27 19:01:14 EST 2012
selfserv with PID 5507 started at Tue Nov 27 19:01:14 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 1000 -C c -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:14 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:14 EST 2012
ssl.sh: #2631: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5507 at Tue Nov 27 19:01:14 EST 2012
kill -USR1 5507
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5507 killed at Tue Nov 27 19:01:14 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 19:01:14 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5583 >/dev/null 2>/dev/null
selfserv with PID 5583 found at Tue Nov 27 19:01:14 EST 2012
selfserv with PID 5583 started at Tue Nov 27 19:01:14 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 1000 -C c -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:14 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:01:15 EST 2012
ssl.sh: #2632: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5583 at Tue Nov 27 19:01:15 EST 2012
kill -USR1 5583
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5583 killed at Tue Nov 27 19:01:15 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 19:01:15 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5659 >/dev/null 2>/dev/null
selfserv with PID 5659 found at Tue Nov 27 19:01:15 EST 2012
selfserv with PID 5659 started at Tue Nov 27 19:01:15 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 1000 -C c -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:15 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:16 EST 2012
ssl.sh: #2633: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5659 at Tue Nov 27 19:01:16 EST 2012
kill -USR1 5659
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5659 killed at Tue Nov 27 19:01:16 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 19:01:16 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5735 >/dev/null 2>/dev/null
selfserv with PID 5735 found at Tue Nov 27 19:01:16 EST 2012
selfserv with PID 5735 started at Tue Nov 27 19:01:16 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:16 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:01:16 EST 2012
ssl.sh: #2634: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5735 at Tue Nov 27 19:01:16 EST 2012
kill -USR1 5735
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5735 killed at Tue Nov 27 19:01:16 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 19:01:16 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5811 >/dev/null 2>/dev/null
selfserv with PID 5811 found at Tue Nov 27 19:01:16 EST 2012
selfserv with PID 5811 started at Tue Nov 27 19:01:16 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:16 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:01:17 EST 2012
ssl.sh: #2635: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5811 at Tue Nov 27 19:01:17 EST 2012
kill -USR1 5811
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5811 killed at Tue Nov 27 19:01:17 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Tue Nov 27 19:01:17 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5893 >/dev/null 2>/dev/null
selfserv with PID 5893 found at Tue Nov 27 19:01:17 EST 2012
selfserv with PID 5893 started at Tue Nov 27 19:01:17 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:17 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:01:17 EST 2012
ssl.sh: #2636: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5893 at Tue Nov 27 19:01:17 EST 2012
kill -USR1 5893
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5893 killed at Tue Nov 27 19:01:17 EST 2012
ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:01:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5994 >/dev/null 2>/dev/null
selfserv with PID 5994 found at Tue Nov 27 19:01:18 EST 2012
selfserv with PID 5994 started at Tue Nov 27 19:01:18 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:18 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:01:18 EST 2012
ssl.sh: #2637: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5994 at Tue Nov 27 19:01:18 EST 2012
kill -USR1 5994
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5994 killed at Tue Nov 27 19:01:18 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:01:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6069 >/dev/null 2>/dev/null
selfserv with PID 6069 found at Tue Nov 27 19:01:18 EST 2012
selfserv with PID 6069 started at Tue Nov 27 19:01:18 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 100 -C c -N -n TestUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:18 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:01:19 EST 2012
ssl.sh: #2638: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6069 at Tue Nov 27 19:01:19 EST 2012
kill -USR1 6069
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6069 killed at Tue Nov 27 19:01:19 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:01:19 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6145 >/dev/null 2>/dev/null
selfserv with PID 6145 found at Tue Nov 27 19:01:19 EST 2012
selfserv with PID 6145 started at Tue Nov 27 19:01:19 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:19 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:01:19 EST 2012
ssl.sh: #2639: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6145 at Tue Nov 27 19:01:19 EST 2012
kill -USR1 6145
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6145 killed at Tue Nov 27 19:01:19 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:01:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6221 >/dev/null 2>/dev/null
selfserv with PID 6221 found at Tue Nov 27 19:01:20 EST 2012
selfserv with PID 6221 started at Tue Nov 27 19:01:20 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:20 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:20 EST 2012
ssl.sh: #2640: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6221 at Tue Nov 27 19:01:20 EST 2012
kill -USR1 6221
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6221 killed at Tue Nov 27 19:01:20 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:01:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6297 >/dev/null 2>/dev/null
selfserv with PID 6297 found at Tue Nov 27 19:01:20 EST 2012
selfserv with PID 6297 started at Tue Nov 27 19:01:20 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:20 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:20 EST 2012
ssl.sh: #2641: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6297 at Tue Nov 27 19:01:20 EST 2012
kill -USR1 6297
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6297 killed at Tue Nov 27 19:01:20 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:01:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6373 >/dev/null 2>/dev/null
selfserv with PID 6373 found at Tue Nov 27 19:01:20 EST 2012
selfserv with PID 6373 started at Tue Nov 27 19:01:20 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:20 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:01:21 EST 2012
ssl.sh: #2642: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6373 at Tue Nov 27 19:01:21 EST 2012
kill -USR1 6373
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6373 killed at Tue Nov 27 19:01:21 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:01:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6449 >/dev/null 2>/dev/null
selfserv with PID 6449 found at Tue Nov 27 19:01:21 EST 2012
selfserv with PID 6449 started at Tue Nov 27 19:01:21 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:21 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:01:21 EST 2012
ssl.sh: #2643: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6449 at Tue Nov 27 19:01:21 EST 2012
kill -USR1 6449
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6449 killed at Tue Nov 27 19:01:21 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 19:01:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6531 >/dev/null 2>/dev/null
selfserv with PID 6531 found at Tue Nov 27 19:01:21 EST 2012
selfserv with PID 6531 started at Tue Nov 27 19:01:21 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:21 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:01:22 EST 2012
ssl.sh: #2644: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6531 at Tue Nov 27 19:01:22 EST 2012
kill -USR1 6531
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6531 killed at Tue Nov 27 19:01:22 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 19:01:22 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6613 >/dev/null 2>/dev/null
selfserv with PID 6613 found at Tue Nov 27 19:01:22 EST 2012
selfserv with PID 6613 started at Tue Nov 27 19:01:22 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:22 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:01:22 EST 2012
ssl.sh: #2645: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6613 at Tue Nov 27 19:01:23 EST 2012
kill -USR1 6613
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6613 killed at Tue Nov 27 19:01:23 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:01:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6710 >/dev/null 2>/dev/null
selfserv with PID 6710 found at Tue Nov 27 19:01:23 EST 2012
selfserv with PID 6710 started at Tue Nov 27 19:01:23 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 100 -C :C009 -N -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:23 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:01:24 EST 2012
ssl.sh: #2646: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6710 at Tue Nov 27 19:01:24 EST 2012
kill -USR1 6710
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6710 killed at Tue Nov 27 19:01:24 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:01:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6785 >/dev/null 2>/dev/null
selfserv with PID 6785 found at Tue Nov 27 19:01:24 EST 2012
selfserv with PID 6785 started at Tue Nov 27 19:01:24 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 1000 -C :C013 -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:24 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:24 EST 2012
ssl.sh: #2647: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6785 at Tue Nov 27 19:01:24 EST 2012
kill -USR1 6785
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6785 killed at Tue Nov 27 19:01:24 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:01:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6861 >/dev/null 2>/dev/null
selfserv with PID 6861 found at Tue Nov 27 19:01:24 EST 2012
selfserv with PID 6861 started at Tue Nov 27 19:01:24 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C :C004 -N \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:24 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:01:25 EST 2012
ssl.sh: #2648: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6861 at Tue Nov 27 19:01:25 EST 2012
kill -USR1 6861
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6861 killed at Tue Nov 27 19:01:25 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:01:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6936 >/dev/null 2>/dev/null
selfserv with PID 6936 found at Tue Nov 27 19:01:25 EST 2012
selfserv with PID 6936 started at Tue Nov 27 19:01:25 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C :C00E -N \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:25 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:01:26 EST 2012
ssl.sh: #2649: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6936 at Tue Nov 27 19:01:26 EST 2012
kill -USR1 6936
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6936 killed at Tue Nov 27 19:01:26 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:01:26 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7011 >/dev/null 2>/dev/null
selfserv with PID 7011 found at Tue Nov 27 19:01:26 EST 2012
selfserv with PID 7011 started at Tue Nov 27 19:01:26 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 1000 -C :C013 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:26 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:27 EST 2012
ssl.sh: #2650: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 7011 at Tue Nov 27 19:01:27 EST 2012
kill -USR1 7011
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7011 killed at Tue Nov 27 19:01:27 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 19:01:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7087 >/dev/null 2>/dev/null
selfserv with PID 7087 found at Tue Nov 27 19:01:27 EST 2012
selfserv with PID 7087 started at Tue Nov 27 19:01:27 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 1000 -C :C004 -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:27 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:01:28 EST 2012
ssl.sh: #2651: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 7087 at Tue Nov 27 19:01:28 EST 2012
kill -USR1 7087
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7087 killed at Tue Nov 27 19:01:28 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:01:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7184 >/dev/null 2>/dev/null
selfserv with PID 7184 found at Tue Nov 27 19:01:28 EST 2012
selfserv with PID 7184 started at Tue Nov 27 19:01:28 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:28 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:01:28 EST 2012
ssl.sh: #2652: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 7184 at Tue Nov 27 19:01:28 EST 2012
kill -USR1 7184
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7184 killed at Tue Nov 27 19:01:28 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:01:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7259 >/dev/null 2>/dev/null
selfserv with PID 7259 found at Tue Nov 27 19:01:28 EST 2012
selfserv with PID 7259 started at Tue Nov 27 19:01:28 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:28 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:29 EST 2012
ssl.sh: #2653: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 7259 at Tue Nov 27 19:01:29 EST 2012
kill -USR1 7259
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7259 killed at Tue Nov 27 19:01:29 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:01:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7335 >/dev/null 2>/dev/null
selfserv with PID 7335 found at Tue Nov 27 19:01:29 EST 2012
selfserv with PID 7335 started at Tue Nov 27 19:01:29 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 10 -C :C004 -N -n TestUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:01:29 EST 2012
ssl.sh: #2654: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 7335 at Tue Nov 27 19:01:29 EST 2012
kill -USR1 7335
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7335 killed at Tue Nov 27 19:01:29 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:01:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7410 >/dev/null 2>/dev/null
selfserv with PID 7410 found at Tue Nov 27 19:01:29 EST 2012
selfserv with PID 7410 started at Tue Nov 27 19:01:29 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:01:30 EST 2012
ssl.sh: #2655: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 7410 at Tue Nov 27 19:01:30 EST 2012
kill -USR1 7410
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7410 killed at Tue Nov 27 19:01:30 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:01:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7485 >/dev/null 2>/dev/null
selfserv with PID 7485 found at Tue Nov 27 19:01:30 EST 2012
selfserv with PID 7485 started at Tue Nov 27 19:01:30 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 100 -C :C013 -n TestUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:30 EST 2012
ssl.sh: #2656: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 7485 at Tue Nov 27 19:01:30 EST 2012
kill -USR1 7485
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7485 killed at Tue Nov 27 19:01:30 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:01:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7561 >/dev/null 2>/dev/null
selfserv with PID 7561 found at Tue Nov 27 19:01:30 EST 2012
selfserv with PID 7561 started at Tue Nov 27 19:01:30 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:01:30 EST 2012
ssl.sh: #2657: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 7561 at Tue Nov 27 19:01:30 EST 2012
kill -USR1 7561
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7561 killed at Tue Nov 27 19:01:30 EST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal - with ECC ===============================
selfserv starting at Tue Nov 27 19:01:30 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
selfserv with PID 7624 started at Tue Nov 27 19:01:31 EST 2012
ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2658: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2659: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2660: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2661: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2662: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2663: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2664: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2665: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2666: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2667: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2668: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2669: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2670: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2671: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2672: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2673: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2674: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2675: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2676: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2677: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2678: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2679: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2680: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2681: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2682: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2683: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2684: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2685: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2686: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2687: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2688: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2689: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2690: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2691: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2692: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2693: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2694: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2695: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2696: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2697: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 7624 at Tue Nov 27 19:01:34 EST 2012
kill -USR1 7624
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7624 killed at Tue Nov 27 19:01:34 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:01:34 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8847 >/dev/null 2>/dev/null
selfserv with PID 8847 found at Tue Nov 27 19:01:34 EST 2012
selfserv with PID 8847 started at Tue Nov 27 19:01:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2698: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8847 >/dev/null 2>/dev/null
selfserv with PID 8847 found at Tue Nov 27 19:01:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2699: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8847 >/dev/null 2>/dev/null
selfserv with PID 8847 found at Tue Nov 27 19:01:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2700: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8847 >/dev/null 2>/dev/null
selfserv with PID 8847 found at Tue Nov 27 19:01:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2701: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8847 >/dev/null 2>/dev/null
selfserv with PID 8847 found at Tue Nov 27 19:01:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2702: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8847 at Tue Nov 27 19:01:34 EST 2012
kill -USR1 8847
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8847 killed at Tue Nov 27 19:01:35 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:01:35 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:35 EST 2012
selfserv with PID 8995 started at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2703: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2704: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2705: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2706: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2707: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2708: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2709: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2710: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2711: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2712: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2713: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2714: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2715: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2716: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2717: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8995 at Tue Nov 27 19:01:36 EST 2012
kill -USR1 8995
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8995 killed at Tue Nov 27 19:01:36 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:01:36 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9394 >/dev/null 2>/dev/null
selfserv with PID 9394 found at Tue Nov 27 19:01:36 EST 2012
selfserv with PID 9394 started at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2718: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 9394 >/dev/null 2>/dev/null
selfserv with PID 9394 found at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2719: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9394 >/dev/null 2>/dev/null
selfserv with PID 9394 found at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2720: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9394 >/dev/null 2>/dev/null
selfserv with PID 9394 found at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2721: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9394 >/dev/null 2>/dev/null
selfserv with PID 9394 found at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2722: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 9394 at Tue Nov 27 19:01:37 EST 2012
kill -USR1 9394
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9394 killed at Tue Nov 27 19:01:37 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:01:37 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:37 EST 2012
selfserv with PID 9542 started at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2723: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2724: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2725: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2726: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2727: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2728: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2729: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2730: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2731: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2732: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2733: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2734: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2735: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2736: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2737: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 9542 at Tue Nov 27 19:01:39 EST 2012
kill -USR1 9542
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9542 killed at Tue Nov 27 19:01:39 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:01:39 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9927 >/dev/null 2>/dev/null
selfserv with PID 9927 found at Tue Nov 27 19:01:39 EST 2012
selfserv with PID 9927 started at Tue Nov 27 19:01:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2738: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 9927 >/dev/null 2>/dev/null
selfserv with PID 9927 found at Tue Nov 27 19:01:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2739: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9927 >/dev/null 2>/dev/null
selfserv with PID 9927 found at Tue Nov 27 19:01:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2740: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9927 >/dev/null 2>/dev/null
selfserv with PID 9927 found at Tue Nov 27 19:01:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2741: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9927 >/dev/null 2>/dev/null
selfserv with PID 9927 found at Tue Nov 27 19:01:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2742: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 9927 at Tue Nov 27 19:01:39 EST 2012
kill -USR1 9927
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9927 killed at Tue Nov 27 19:01:39 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:01:39 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10075 >/dev/null 2>/dev/null
selfserv with PID 10075 found at Tue Nov 27 19:01:39 EST 2012
selfserv with PID 10075 started at Tue Nov 27 19:01:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2743: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 10075 >/dev/null 2>/dev/null
selfserv with PID 10075 found at Tue Nov 27 19:01:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2744: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10075 >/dev/null 2>/dev/null
selfserv with PID 10075 found at Tue Nov 27 19:01:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2745: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10075 >/dev/null 2>/dev/null
selfserv with PID 10075 found at Tue Nov 27 19:01:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2746: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10075 >/dev/null 2>/dev/null
selfserv with PID 10075 found at Tue Nov 27 19:01:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2747: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10075 at Tue Nov 27 19:01:40 EST 2012
kill -USR1 10075
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10075 killed at Tue Nov 27 19:01:40 EST 2012
ssl.sh: SSL Client Authentication Extended Test - server fips/client normal - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:40 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10274 >/dev/null 2>/dev/null
selfserv with PID 10274 found at Tue Nov 27 19:01:40 EST 2012
selfserv with PID 10274 started at Tue Nov 27 19:01:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2748: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10274 at Tue Nov 27 19:01:40 EST 2012
kill -USR1 10274
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10274 killed at Tue Nov 27 19:01:40 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:01:40 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10331 >/dev/null 2>/dev/null
selfserv with PID 10331 found at Tue Nov 27 19:01:40 EST 2012
selfserv with PID 10331 started at Tue Nov 27 19:01:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2749: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10331 at Tue Nov 27 19:01:41 EST 2012
kill -USR1 10331
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10331 killed at Tue Nov 27 19:01:41 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:01:41 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10388 >/dev/null 2>/dev/null
selfserv with PID 10388 found at Tue Nov 27 19:01:41 EST 2012
selfserv with PID 10388 started at Tue Nov 27 19:01:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2750: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10388 at Tue Nov 27 19:01:41 EST 2012
kill -USR1 10388
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10388 killed at Tue Nov 27 19:01:41 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:41 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10445 >/dev/null 2>/dev/null
selfserv with PID 10445 found at Tue Nov 27 19:01:41 EST 2012
selfserv with PID 10445 started at Tue Nov 27 19:01:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2751: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10445 at Tue Nov 27 19:01:41 EST 2012
kill -USR1 10445
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10445 killed at Tue Nov 27 19:01:41 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:01:41 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Tue Nov 27 19:01:41 EST 2012
selfserv with PID 10502 started at Tue Nov 27 19:01:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2752: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10502 at Tue Nov 27 19:01:42 EST 2012
kill -USR1 10502
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10502 killed at Tue Nov 27 19:01:42 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:01:42 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10560 >/dev/null 2>/dev/null
selfserv with PID 10560 found at Tue Nov 27 19:01:42 EST 2012
selfserv with PID 10560 started at Tue Nov 27 19:01:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2753: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10560 at Tue Nov 27 19:01:42 EST 2012
kill -USR1 10560
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10560 killed at Tue Nov 27 19:01:42 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:42 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10617 >/dev/null 2>/dev/null
selfserv with PID 10617 found at Tue Nov 27 19:01:42 EST 2012
selfserv with PID 10617 started at Tue Nov 27 19:01:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2754: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10617 at Tue Nov 27 19:01:42 EST 2012
kill -USR1 10617
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10617 killed at Tue Nov 27 19:01:42 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:01:42 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10674 >/dev/null 2>/dev/null
selfserv with PID 10674 found at Tue Nov 27 19:01:42 EST 2012
selfserv with PID 10674 started at Tue Nov 27 19:01:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2755: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10674 at Tue Nov 27 19:01:43 EST 2012
kill -USR1 10674
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10674 killed at Tue Nov 27 19:01:43 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:01:43 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10731 >/dev/null 2>/dev/null
selfserv with PID 10731 found at Tue Nov 27 19:01:43 EST 2012
selfserv with PID 10731 started at Tue Nov 27 19:01:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2756: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10731 at Tue Nov 27 19:01:43 EST 2012
kill -USR1 10731
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10731 killed at Tue Nov 27 19:01:43 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:43 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10788 >/dev/null 2>/dev/null
selfserv with PID 10788 found at Tue Nov 27 19:01:43 EST 2012
selfserv with PID 10788 started at Tue Nov 27 19:01:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2757: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10788 at Tue Nov 27 19:01:43 EST 2012
kill -USR1 10788
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10788 killed at Tue Nov 27 19:01:43 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:01:43 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10845 >/dev/null 2>/dev/null
selfserv with PID 10845 found at Tue Nov 27 19:01:43 EST 2012
selfserv with PID 10845 started at Tue Nov 27 19:01:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2758: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10845 at Tue Nov 27 19:01:44 EST 2012
kill -USR1 10845
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10845 killed at Tue Nov 27 19:01:44 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:01:44 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10902 >/dev/null 2>/dev/null
selfserv with PID 10902 found at Tue Nov 27 19:01:44 EST 2012
selfserv with PID 10902 started at Tue Nov 27 19:01:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2759: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10902 at Tue Nov 27 19:01:44 EST 2012
kill -USR1 10902
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10902 killed at Tue Nov 27 19:01:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:44 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Tue Nov 27 19:01:44 EST 2012
selfserv with PID 10960 started at Tue Nov 27 19:01:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2760: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10960 at Tue Nov 27 19:01:44 EST 2012
kill -USR1 10960
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10960 killed at Tue Nov 27 19:01:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:01:44 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11017 >/dev/null 2>/dev/null
selfserv with PID 11017 found at Tue Nov 27 19:01:44 EST 2012
selfserv with PID 11017 started at Tue Nov 27 19:01:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2761: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11017 at Tue Nov 27 19:01:45 EST 2012
kill -USR1 11017
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11017 killed at Tue Nov 27 19:01:45 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:45 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11074 >/dev/null 2>/dev/null
selfserv with PID 11074 found at Tue Nov 27 19:01:45 EST 2012
selfserv with PID 11074 started at Tue Nov 27 19:01:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2762: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11074 at Tue Nov 27 19:01:45 EST 2012
kill -USR1 11074
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11074 killed at Tue Nov 27 19:01:45 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:45 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11131 >/dev/null 2>/dev/null
selfserv with PID 11131 found at Tue Nov 27 19:01:45 EST 2012
selfserv with PID 11131 started at Tue Nov 27 19:01:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2763: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11131 at Tue Nov 27 19:01:45 EST 2012
kill -USR1 11131
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11131 killed at Tue Nov 27 19:01:45 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:01:45 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11188 >/dev/null 2>/dev/null
selfserv with PID 11188 found at Tue Nov 27 19:01:45 EST 2012
selfserv with PID 11188 started at Tue Nov 27 19:01:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2764: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11188 at Tue Nov 27 19:01:46 EST 2012
kill -USR1 11188
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11188 killed at Tue Nov 27 19:01:46 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:46 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11245 >/dev/null 2>/dev/null
selfserv with PID 11245 found at Tue Nov 27 19:01:46 EST 2012
selfserv with PID 11245 started at Tue Nov 27 19:01:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2765: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11245 at Tue Nov 27 19:01:46 EST 2012
kill -USR1 11245
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11245 killed at Tue Nov 27 19:01:46 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:46 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11302 >/dev/null 2>/dev/null
selfserv with PID 11302 found at Tue Nov 27 19:01:46 EST 2012
selfserv with PID 11302 started at Tue Nov 27 19:01:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2766: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11302 at Tue Nov 27 19:01:46 EST 2012
kill -USR1 11302
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11302 killed at Tue Nov 27 19:01:46 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:01:46 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11359 >/dev/null 2>/dev/null
selfserv with PID 11359 found at Tue Nov 27 19:01:46 EST 2012
selfserv with PID 11359 started at Tue Nov 27 19:01:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2767: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11359 at Tue Nov 27 19:01:46 EST 2012
kill -USR1 11359
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11359 killed at Tue Nov 27 19:01:46 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:47 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11416 >/dev/null 2>/dev/null
selfserv with PID 11416 found at Tue Nov 27 19:01:47 EST 2012
selfserv with PID 11416 started at Tue Nov 27 19:01:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2768: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11416 at Tue Nov 27 19:01:47 EST 2012
kill -USR1 11416
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11416 killed at Tue Nov 27 19:01:47 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:47 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11473 >/dev/null 2>/dev/null
selfserv with PID 11473 found at Tue Nov 27 19:01:47 EST 2012
selfserv with PID 11473 started at Tue Nov 27 19:01:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2769: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11473 at Tue Nov 27 19:01:47 EST 2012
kill -USR1 11473
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11473 killed at Tue Nov 27 19:01:47 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:01:47 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11530 >/dev/null 2>/dev/null
selfserv with PID 11530 found at Tue Nov 27 19:01:47 EST 2012
selfserv with PID 11530 started at Tue Nov 27 19:01:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2770: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11530 at Tue Nov 27 19:01:47 EST 2012
kill -USR1 11530
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11530 killed at Tue Nov 27 19:01:48 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:48 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11587 >/dev/null 2>/dev/null
selfserv with PID 11587 found at Tue Nov 27 19:01:48 EST 2012
selfserv with PID 11587 started at Tue Nov 27 19:01:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2771: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11587 at Tue Nov 27 19:01:48 EST 2012
kill -USR1 11587
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11587 killed at Tue Nov 27 19:01:48 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:48 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11646 >/dev/null 2>/dev/null
selfserv with PID 11646 found at Tue Nov 27 19:01:48 EST 2012
selfserv with PID 11646 started at Tue Nov 27 19:01:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2772: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11646 at Tue Nov 27 19:01:48 EST 2012
kill -USR1 11646
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11646 killed at Tue Nov 27 19:01:48 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:01:48 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11703 >/dev/null 2>/dev/null
selfserv with PID 11703 found at Tue Nov 27 19:01:48 EST 2012
selfserv with PID 11703 started at Tue Nov 27 19:01:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2773: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11703 at Tue Nov 27 19:01:48 EST 2012
kill -USR1 11703
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11703 killed at Tue Nov 27 19:01:48 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:49 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11762 >/dev/null 2>/dev/null
selfserv with PID 11762 found at Tue Nov 27 19:01:49 EST 2012
selfserv with PID 11762 started at Tue Nov 27 19:01:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2774: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11762 at Tue Nov 27 19:01:49 EST 2012
kill -USR1 11762
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11762 killed at Tue Nov 27 19:01:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:49 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11819 >/dev/null 2>/dev/null
selfserv with PID 11819 found at Tue Nov 27 19:01:49 EST 2012
selfserv with PID 11819 started at Tue Nov 27 19:01:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2775: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11819 at Tue Nov 27 19:01:49 EST 2012
kill -USR1 11819
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11819 killed at Tue Nov 27 19:01:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:01:49 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11877 >/dev/null 2>/dev/null
selfserv with PID 11877 found at Tue Nov 27 19:01:49 EST 2012
selfserv with PID 11877 started at Tue Nov 27 19:01:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2776: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11877 at Tue Nov 27 19:01:49 EST 2012
kill -USR1 11877
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11877 killed at Tue Nov 27 19:01:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:49 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11934 >/dev/null 2>/dev/null
selfserv with PID 11934 found at Tue Nov 27 19:01:49 EST 2012
selfserv with PID 11934 started at Tue Nov 27 19:01:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2777: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11934 at Tue Nov 27 19:01:50 EST 2012
kill -USR1 11934
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11934 killed at Tue Nov 27 19:01:50 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:50 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12006 >/dev/null 2>/dev/null
selfserv with PID 12006 found at Tue Nov 27 19:01:50 EST 2012
selfserv with PID 12006 started at Tue Nov 27 19:01:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2778: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12006 at Tue Nov 27 19:01:50 EST 2012
kill -USR1 12006
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12006 killed at Tue Nov 27 19:01:50 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:50 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12063 >/dev/null 2>/dev/null
selfserv with PID 12063 found at Tue Nov 27 19:01:50 EST 2012
selfserv with PID 12063 started at Tue Nov 27 19:01:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2779: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12063 at Tue Nov 27 19:01:50 EST 2012
kill -USR1 12063
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12063 killed at Tue Nov 27 19:01:50 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:50 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12120 >/dev/null 2>/dev/null
selfserv with PID 12120 found at Tue Nov 27 19:01:51 EST 2012
selfserv with PID 12120 started at Tue Nov 27 19:01:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2780: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12120 at Tue Nov 27 19:01:51 EST 2012
kill -USR1 12120
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12120 killed at Tue Nov 27 19:01:51 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:51 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12177 >/dev/null 2>/dev/null
selfserv with PID 12177 found at Tue Nov 27 19:01:51 EST 2012
selfserv with PID 12177 started at Tue Nov 27 19:01:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2781: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12177 at Tue Nov 27 19:01:51 EST 2012
kill -USR1 12177
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12177 killed at Tue Nov 27 19:01:51 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:51 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12234 >/dev/null 2>/dev/null
selfserv with PID 12234 found at Tue Nov 27 19:01:51 EST 2012
selfserv with PID 12234 started at Tue Nov 27 19:01:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2782: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12234 at Tue Nov 27 19:01:51 EST 2012
kill -USR1 12234
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12234 killed at Tue Nov 27 19:01:51 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:51 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12291 >/dev/null 2>/dev/null
selfserv with PID 12291 found at Tue Nov 27 19:01:51 EST 2012
selfserv with PID 12291 started at Tue Nov 27 19:01:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2783: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12291 at Tue Nov 27 19:01:52 EST 2012
kill -USR1 12291
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12291 killed at Tue Nov 27 19:01:52 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:52 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12349 >/dev/null 2>/dev/null
selfserv with PID 12349 found at Tue Nov 27 19:01:52 EST 2012
selfserv with PID 12349 started at Tue Nov 27 19:01:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2784: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12349 at Tue Nov 27 19:01:52 EST 2012
kill -USR1 12349
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12349 killed at Tue Nov 27 19:01:52 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:52 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12408 >/dev/null 2>/dev/null
selfserv with PID 12408 found at Tue Nov 27 19:01:52 EST 2012
selfserv with PID 12408 started at Tue Nov 27 19:01:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2785: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12408 at Tue Nov 27 19:01:53 EST 2012
kill -USR1 12408
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12408 killed at Tue Nov 27 19:01:53 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:53 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12466 >/dev/null 2>/dev/null
selfserv with PID 12466 found at Tue Nov 27 19:01:53 EST 2012
selfserv with PID 12466 started at Tue Nov 27 19:01:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2786: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12466 at Tue Nov 27 19:01:53 EST 2012
kill -USR1 12466
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12466 killed at Tue Nov 27 19:01:53 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:53 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12523 >/dev/null 2>/dev/null
selfserv with PID 12523 found at Tue Nov 27 19:01:53 EST 2012
selfserv with PID 12523 started at Tue Nov 27 19:01:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2787: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12523 at Tue Nov 27 19:01:53 EST 2012
kill -USR1 12523
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12523 killed at Tue Nov 27 19:01:53 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:53 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12580 >/dev/null 2>/dev/null
selfserv with PID 12580 found at Tue Nov 27 19:01:53 EST 2012
selfserv with PID 12580 started at Tue Nov 27 19:01:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2788: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12580 at Tue Nov 27 19:01:54 EST 2012
kill -USR1 12580
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12580 killed at Tue Nov 27 19:01:54 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:54 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12637 >/dev/null 2>/dev/null
selfserv with PID 12637 found at Tue Nov 27 19:01:54 EST 2012
selfserv with PID 12637 started at Tue Nov 27 19:01:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2789: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12637 at Tue Nov 27 19:01:54 EST 2012
kill -USR1 12637
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12637 killed at Tue Nov 27 19:01:54 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:54 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12694 >/dev/null 2>/dev/null
selfserv with PID 12694 found at Tue Nov 27 19:01:54 EST 2012
selfserv with PID 12694 started at Tue Nov 27 19:01:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2790: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12694 at Tue Nov 27 19:01:54 EST 2012
kill -USR1 12694
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12694 killed at Tue Nov 27 19:01:54 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:54 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12751 >/dev/null 2>/dev/null
selfserv with PID 12751 found at Tue Nov 27 19:01:54 EST 2012
selfserv with PID 12751 started at Tue Nov 27 19:01:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2791: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12751 at Tue Nov 27 19:01:55 EST 2012
kill -USR1 12751
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12751 killed at Tue Nov 27 19:01:55 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:55 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12808 >/dev/null 2>/dev/null
selfserv with PID 12808 found at Tue Nov 27 19:01:55 EST 2012
selfserv with PID 12808 started at Tue Nov 27 19:01:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2792: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12808 at Tue Nov 27 19:01:55 EST 2012
kill -USR1 12808
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12808 killed at Tue Nov 27 19:01:55 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:55 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12865 >/dev/null 2>/dev/null
selfserv with PID 12865 found at Tue Nov 27 19:01:55 EST 2012
selfserv with PID 12865 started at Tue Nov 27 19:01:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2793: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12865 at Tue Nov 27 19:01:55 EST 2012
kill -USR1 12865
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12865 killed at Tue Nov 27 19:01:55 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:55 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12922 >/dev/null 2>/dev/null
selfserv with PID 12922 found at Tue Nov 27 19:01:55 EST 2012
selfserv with PID 12922 started at Tue Nov 27 19:01:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2794: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12922 at Tue Nov 27 19:01:56 EST 2012
kill -USR1 12922
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12922 killed at Tue Nov 27 19:01:56 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:56 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12979 >/dev/null 2>/dev/null
selfserv with PID 12979 found at Tue Nov 27 19:01:56 EST 2012
selfserv with PID 12979 started at Tue Nov 27 19:01:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2795: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12979 at Tue Nov 27 19:01:56 EST 2012
kill -USR1 12979
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12979 killed at Tue Nov 27 19:01:56 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:56 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13036 >/dev/null 2>/dev/null
selfserv with PID 13036 found at Tue Nov 27 19:01:56 EST 2012
selfserv with PID 13036 started at Tue Nov 27 19:01:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2796: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13036 at Tue Nov 27 19:01:56 EST 2012
kill -USR1 13036
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13036 killed at Tue Nov 27 19:01:56 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:56 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13093 >/dev/null 2>/dev/null
selfserv with PID 13093 found at Tue Nov 27 19:01:56 EST 2012
selfserv with PID 13093 started at Tue Nov 27 19:01:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2797: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13093 at Tue Nov 27 19:01:57 EST 2012
kill -USR1 13093
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13093 killed at Tue Nov 27 19:01:57 EST 2012
ssl.sh: skipping TLS Server hello response without SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI for Extended Test
ssl.sh: skipping TLS Server response with alert for Extended Test
ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping TLS Server hello response without SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server fips/client normal - with ECC ===============================
ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:01:57 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13264 >/dev/null 2>/dev/null
selfserv with PID 13264 found at Tue Nov 27 19:01:57 EST 2012
selfserv with PID 13264 started at Tue Nov 27 19:01:57 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 1000 -C c -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:58 EST 2012
ssl.sh: #2798: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13264 at Tue Nov 27 19:01:58 EST 2012
kill -USR1 13264
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13264 killed at Tue Nov 27 19:01:58 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:01:58 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13340 >/dev/null 2>/dev/null
selfserv with PID 13340 found at Tue Nov 27 19:01:58 EST 2012
selfserv with PID 13340 started at Tue Nov 27 19:01:58 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 1000 -C c \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:58 EST 2012
ssl.sh: #2799: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13340 at Tue Nov 27 19:01:58 EST 2012
kill -USR1 13340
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13340 killed at Tue Nov 27 19:01:58 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 19:01:58 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13416 >/dev/null 2>/dev/null
selfserv with PID 13416 found at Tue Nov 27 19:01:58 EST 2012
selfserv with PID 13416 started at Tue Nov 27 19:01:58 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 1000 -C c -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:59 EST 2012
ssl.sh: #2800: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13416 at Tue Nov 27 19:01:59 EST 2012
kill -USR1 13416
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13416 killed at Tue Nov 27 19:01:59 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 19:01:59 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13492 >/dev/null 2>/dev/null
selfserv with PID 13492 found at Tue Nov 27 19:01:59 EST 2012
selfserv with PID 13492 started at Tue Nov 27 19:01:59 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:01:59 EST 2012
ssl.sh: #2801: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13492 at Tue Nov 27 19:01:59 EST 2012
kill -USR1 13492
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13492 killed at Tue Nov 27 19:01:59 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 19:01:59 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:01:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13569 >/dev/null 2>/dev/null
selfserv with PID 13569 found at Tue Nov 27 19:01:59 EST 2012
selfserv with PID 13569 started at Tue Nov 27 19:01:59 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:02:00 EST 2012
ssl.sh: #2802: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13569 at Tue Nov 27 19:02:00 EST 2012
kill -USR1 13569
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13569 killed at Tue Nov 27 19:02:00 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 19:02:00 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13645 >/dev/null 2>/dev/null
selfserv with PID 13645 found at Tue Nov 27 19:02:00 EST 2012
selfserv with PID 13645 started at Tue Nov 27 19:02:00 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:00 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:02:01 EST 2012
ssl.sh: #2803: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13645 at Tue Nov 27 19:02:01 EST 2012
kill -USR1 13645
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13645 killed at Tue Nov 27 19:02:01 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 19:02:01 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13729 >/dev/null 2>/dev/null
selfserv with PID 13729 found at Tue Nov 27 19:02:01 EST 2012
selfserv with PID 13729 started at Tue Nov 27 19:02:01 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:01 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:02:01 EST 2012
ssl.sh: #2804: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13729 at Tue Nov 27 19:02:01 EST 2012
kill -USR1 13729
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13729 killed at Tue Nov 27 19:02:01 EST 2012
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:02:02 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13836 >/dev/null 2>/dev/null
selfserv with PID 13836 found at Tue Nov 27 19:02:02 EST 2012
selfserv with PID 13836 started at Tue Nov 27 19:02:02 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:02 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:02:02 EST 2012
ssl.sh: #2805: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13836 at Tue Nov 27 19:02:02 EST 2012
kill -USR1 13836
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13836 killed at Tue Nov 27 19:02:02 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:02:02 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13911 >/dev/null 2>/dev/null
selfserv with PID 13911 found at Tue Nov 27 19:02:02 EST 2012
selfserv with PID 13911 started at Tue Nov 27 19:02:02 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:02 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:02:03 EST 2012
ssl.sh: #2806: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13911 at Tue Nov 27 19:02:03 EST 2012
kill -USR1 13911
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13911 killed at Tue Nov 27 19:02:03 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:02:03 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13986 >/dev/null 2>/dev/null
selfserv with PID 13986 found at Tue Nov 27 19:02:03 EST 2012
selfserv with PID 13986 started at Tue Nov 27 19:02:03 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:03 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:02:04 EST 2012
ssl.sh: #2807: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13986 at Tue Nov 27 19:02:04 EST 2012
kill -USR1 13986
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13986 killed at Tue Nov 27 19:02:04 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:02:04 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14062 >/dev/null 2>/dev/null
selfserv with PID 14062 found at Tue Nov 27 19:02:04 EST 2012
selfserv with PID 14062 started at Tue Nov 27 19:02:04 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:04 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:02:04 EST 2012
ssl.sh: #2808: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14062 at Tue Nov 27 19:02:04 EST 2012
kill -USR1 14062
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14062 killed at Tue Nov 27 19:02:04 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:02:04 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14138 >/dev/null 2>/dev/null
selfserv with PID 14138 found at Tue Nov 27 19:02:04 EST 2012
selfserv with PID 14138 started at Tue Nov 27 19:02:04 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:04 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:02:05 EST 2012
ssl.sh: #2809: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14138 at Tue Nov 27 19:02:05 EST 2012
kill -USR1 14138
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14138 killed at Tue Nov 27 19:02:05 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:02:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14214 >/dev/null 2>/dev/null
selfserv with PID 14214 found at Tue Nov 27 19:02:05 EST 2012
selfserv with PID 14214 started at Tue Nov 27 19:02:05 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:02:05 EST 2012
ssl.sh: #2810: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14214 at Tue Nov 27 19:02:05 EST 2012
kill -USR1 14214
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14214 killed at Tue Nov 27 19:02:05 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:02:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14291 >/dev/null 2>/dev/null
selfserv with PID 14291 found at Tue Nov 27 19:02:05 EST 2012
selfserv with PID 14291 started at Tue Nov 27 19:02:05 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:02:05 EST 2012
ssl.sh: #2811: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14291 at Tue Nov 27 19:02:05 EST 2012
kill -USR1 14291
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14291 killed at Tue Nov 27 19:02:05 EST 2012
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:02:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14396 >/dev/null 2>/dev/null
selfserv with PID 14396 found at Tue Nov 27 19:02:05 EST 2012
selfserv with PID 14396 started at Tue Nov 27 19:02:05 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 100 -C :C009 -N -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:02:07 EST 2012
ssl.sh: #2812: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14396 at Tue Nov 27 19:02:07 EST 2012
kill -USR1 14396
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14396 killed at Tue Nov 27 19:02:07 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:02:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14471 >/dev/null 2>/dev/null
selfserv with PID 14471 found at Tue Nov 27 19:02:07 EST 2012
selfserv with PID 14471 started at Tue Nov 27 19:02:07 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 1000 -C :C013 -V :ssl3 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:02:07 EST 2012
ssl.sh: #2813: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14471 at Tue Nov 27 19:02:07 EST 2012
kill -USR1 14471
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14471 killed at Tue Nov 27 19:02:07 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:02:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14547 >/dev/null 2>/dev/null
selfserv with PID 14547 found at Tue Nov 27 19:02:07 EST 2012
selfserv with PID 14547 started at Tue Nov 27 19:02:07 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C :C004 -N \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:02:08 EST 2012
ssl.sh: #2814: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14547 at Tue Nov 27 19:02:08 EST 2012
kill -USR1 14547
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14547 killed at Tue Nov 27 19:02:09 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:02:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14622 >/dev/null 2>/dev/null
selfserv with PID 14622 found at Tue Nov 27 19:02:09 EST 2012
selfserv with PID 14622 started at Tue Nov 27 19:02:09 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C :C00E -N \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:09 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:02:09 EST 2012
ssl.sh: #2815: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14622 at Tue Nov 27 19:02:09 EST 2012
kill -USR1 14622
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14622 killed at Tue Nov 27 19:02:09 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:02:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14697 >/dev/null 2>/dev/null
selfserv with PID 14697 found at Tue Nov 27 19:02:09 EST 2012
selfserv with PID 14697 started at Tue Nov 27 19:02:09 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C013 \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:10 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:02:10 EST 2012
ssl.sh: #2816: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14697 at Tue Nov 27 19:02:10 EST 2012
kill -USR1 14697
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14697 killed at Tue Nov 27 19:02:10 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 19:02:10 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14773 >/dev/null 2>/dev/null
selfserv with PID 14773 found at Tue Nov 27 19:02:10 EST 2012
selfserv with PID 14773 started at Tue Nov 27 19:02:10 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C004 -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:10 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:02:11 EST 2012
ssl.sh: #2817: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14773 at Tue Nov 27 19:02:11 EST 2012
kill -USR1 14773
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14773 killed at Tue Nov 27 19:02:11 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:02:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14870 >/dev/null 2>/dev/null
selfserv with PID 14870 found at Tue Nov 27 19:02:11 EST 2012
selfserv with PID 14870 started at Tue Nov 27 19:02:11 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:11 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:02:11 EST 2012
ssl.sh: #2818: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14870 at Tue Nov 27 19:02:11 EST 2012
kill -USR1 14870
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14870 killed at Tue Nov 27 19:02:11 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:02:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14945 >/dev/null 2>/dev/null
selfserv with PID 14945 found at Tue Nov 27 19:02:11 EST 2012
selfserv with PID 14945 started at Tue Nov 27 19:02:11 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:11 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:02:12 EST 2012
ssl.sh: #2819: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14945 at Tue Nov 27 19:02:12 EST 2012
kill -USR1 14945
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14945 killed at Tue Nov 27 19:02:12 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:02:12 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15021 >/dev/null 2>/dev/null
selfserv with PID 15021 found at Tue Nov 27 19:02:12 EST 2012
selfserv with PID 15021 started at Tue Nov 27 19:02:12 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:12 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:02:12 EST 2012
ssl.sh: #2820: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 15021 at Tue Nov 27 19:02:12 EST 2012
kill -USR1 15021
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15021 killed at Tue Nov 27 19:02:12 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:02:12 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15096 >/dev/null 2>/dev/null
selfserv with PID 15096 found at Tue Nov 27 19:02:12 EST 2012
selfserv with PID 15096 started at Tue Nov 27 19:02:12 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:12 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:02:13 EST 2012
ssl.sh: #2821: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 15096 at Tue Nov 27 19:02:13 EST 2012
kill -USR1 15096
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15096 killed at Tue Nov 27 19:02:13 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:02:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15171 >/dev/null 2>/dev/null
selfserv with PID 15171 found at Tue Nov 27 19:02:13 EST 2012
selfserv with PID 15171 started at Tue Nov 27 19:02:13 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:13 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:02:13 EST 2012
ssl.sh: #2822: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 15171 at Tue Nov 27 19:02:13 EST 2012
kill -USR1 15171
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15171 killed at Tue Nov 27 19:02:13 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:02:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15247 >/dev/null 2>/dev/null
selfserv with PID 15247 found at Tue Nov 27 19:02:13 EST 2012
selfserv with PID 15247 started at Tue Nov 27 19:02:13 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:13 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:02:14 EST 2012
ssl.sh: #2823: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 15247 at Tue Nov 27 19:02:14 EST 2012
kill -USR1 15247
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15247 killed at Tue Nov 27 19:02:14 EST 2012
ssl.sh: SSL - FIPS mode off for server ===============================
ssl.sh: Turning FIPS off for the server
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -fips false -force
FIPS mode disabled.
ssl.sh: #2824: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -list
ssl.sh: #2825: (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #2826: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: Turning FIPS off for the extended server
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -fips false -force
FIPS mode disabled.
ssl.sh: #2827: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -list
ssl.sh: #2828: (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #2829: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: SSL - FIPS mode on for client ===============================
ssl.sh: Turning FIPS on for the client
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -fips true -force
FIPS mode enabled.
ssl.sh: #2830: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -list
ssl.sh: #2831: (modutil -list) produced a returncode of 0, expected is 0 - PASSED
1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2832: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: Turning FIPS on for the extended client
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -fips true -force
FIPS mode enabled.
ssl.sh: #2833: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -list
ssl.sh: #2834: (modutil -list) produced a returncode of 0, expected is 0 - PASSED
1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2835: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: SSL Cipher Coverage - server normal/client fips - with ECC ===============================
selfserv starting at Tue Nov 27 19:02:15 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:15 EST 2012
selfserv with PID 15440 started at Tue Nov 27 19:02:15 EST 2012
ssl.sh: skipping SSL2_RC4_128_WITH_MD5 (non-FIPS only)
ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2836: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2837: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2838: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2839: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2840: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2841: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2842: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2843: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2844: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2845: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2846: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2847: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2848: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2849: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2850: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2851: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2852: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2853: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2854: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2855: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2856: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2857: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2858: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2859: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2860: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2861: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2862: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2863: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2864: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2865: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2866: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2867: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2868: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2869: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2870: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2871: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2872: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2873: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2874: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2875: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 15440 at Tue Nov 27 19:02:23 EST 2012
kill -USR1 15440
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15440 killed at Tue Nov 27 19:02:23 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:02:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16663 >/dev/null 2>/dev/null
selfserv with PID 16663 found at Tue Nov 27 19:02:23 EST 2012
selfserv with PID 16663 started at Tue Nov 27 19:02:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2876: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 16663 >/dev/null 2>/dev/null
selfserv with PID 16663 found at Tue Nov 27 19:02:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2877: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16663 >/dev/null 2>/dev/null
selfserv with PID 16663 found at Tue Nov 27 19:02:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2878: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16663 >/dev/null 2>/dev/null
selfserv with PID 16663 found at Tue Nov 27 19:02:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2879: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16663 >/dev/null 2>/dev/null
selfserv with PID 16663 found at Tue Nov 27 19:02:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2880: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 16663 at Tue Nov 27 19:02:24 EST 2012
kill -USR1 16663
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16663 killed at Tue Nov 27 19:02:24 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:02:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:24 EST 2012
selfserv with PID 16811 started at Tue Nov 27 19:02:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2881: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2882: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2883: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2884: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2885: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2886: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2887: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2888: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2889: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2890: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2891: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2892: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2893: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2894: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2895: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 16811 at Tue Nov 27 19:02:27 EST 2012
kill -USR1 16811
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16811 killed at Tue Nov 27 19:02:27 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:02:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17210 >/dev/null 2>/dev/null
selfserv with PID 17210 found at Tue Nov 27 19:02:27 EST 2012
selfserv with PID 17210 started at Tue Nov 27 19:02:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2896: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17210 >/dev/null 2>/dev/null
selfserv with PID 17210 found at Tue Nov 27 19:02:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2897: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17210 >/dev/null 2>/dev/null
selfserv with PID 17210 found at Tue Nov 27 19:02:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2898: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17210 >/dev/null 2>/dev/null
selfserv with PID 17210 found at Tue Nov 27 19:02:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2899: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17210 >/dev/null 2>/dev/null
selfserv with PID 17210 found at Tue Nov 27 19:02:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2900: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 17210 at Tue Nov 27 19:02:28 EST 2012
kill -USR1 17210
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17210 killed at Tue Nov 27 19:02:28 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:02:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:28 EST 2012
selfserv with PID 17359 started at Tue Nov 27 19:02:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2901: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2902: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2903: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2904: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2905: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2906: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2907: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2908: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2909: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2910: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2911: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2912: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2913: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2914: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2915: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 17359 at Tue Nov 27 19:02:31 EST 2012
kill -USR1 17359
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17359 killed at Tue Nov 27 19:02:31 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:02:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17744 >/dev/null 2>/dev/null
selfserv with PID 17744 found at Tue Nov 27 19:02:31 EST 2012
selfserv with PID 17744 started at Tue Nov 27 19:02:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2916: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17744 >/dev/null 2>/dev/null
selfserv with PID 17744 found at Tue Nov 27 19:02:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2917: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17744 >/dev/null 2>/dev/null
selfserv with PID 17744 found at Tue Nov 27 19:02:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2918: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17744 >/dev/null 2>/dev/null
selfserv with PID 17744 found at Tue Nov 27 19:02:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2919: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17744 >/dev/null 2>/dev/null
selfserv with PID 17744 found at Tue Nov 27 19:02:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2920: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 17744 at Tue Nov 27 19:02:32 EST 2012
kill -USR1 17744
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17744 killed at Tue Nov 27 19:02:32 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:02:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17892 >/dev/null 2>/dev/null
selfserv with PID 17892 found at Tue Nov 27 19:02:33 EST 2012
selfserv with PID 17892 started at Tue Nov 27 19:02:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2921: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17892 >/dev/null 2>/dev/null
selfserv with PID 17892 found at Tue Nov 27 19:02:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2922: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17892 >/dev/null 2>/dev/null
selfserv with PID 17892 found at Tue Nov 27 19:02:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2923: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17892 >/dev/null 2>/dev/null
selfserv with PID 17892 found at Tue Nov 27 19:02:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2924: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17892 >/dev/null 2>/dev/null
selfserv with PID 17892 found at Tue Nov 27 19:02:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2925: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17892 at Tue Nov 27 19:02:33 EST 2012
kill -USR1 17892
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17892 killed at Tue Nov 27 19:02:34 EST 2012
ssl.sh: SSL Client Authentication - server normal/client fips - with ECC ===============================
ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:02:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18098 >/dev/null 2>/dev/null
selfserv with PID 18098 found at Tue Nov 27 19:02:34 EST 2012
selfserv with PID 18098 started at Tue Nov 27 19:02:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2926: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18098 at Tue Nov 27 19:02:34 EST 2012
kill -USR1 18098
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18098 killed at Tue Nov 27 19:02:34 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:02:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18155 >/dev/null 2>/dev/null
selfserv with PID 18155 found at Tue Nov 27 19:02:34 EST 2012
selfserv with PID 18155 started at Tue Nov 27 19:02:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
Incorrect password/PIN entered.
tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #2927: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18155 at Tue Nov 27 19:02:36 EST 2012
kill -USR1 18155
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18155 killed at Tue Nov 27 19:02:36 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:02:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Tue Nov 27 19:02:36 EST 2012
selfserv with PID 18212 started at Tue Nov 27 19:02:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2928: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18212 at Tue Nov 27 19:02:36 EST 2012
kill -USR1 18212
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18212 killed at Tue Nov 27 19:02:36 EST 2012
ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:02:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18275 >/dev/null 2>/dev/null
selfserv with PID 18275 found at Tue Nov 27 19:02:36 EST 2012
selfserv with PID 18275 started at Tue Nov 27 19:02:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2929: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18275 at Tue Nov 27 19:02:37 EST 2012
kill -USR1 18275
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18275 killed at Tue Nov 27 19:02:37 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:02:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18332 >/dev/null 2>/dev/null
selfserv with PID 18332 found at Tue Nov 27 19:02:37 EST 2012
selfserv with PID 18332 started at Tue Nov 27 19:02:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2930: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18332 at Tue Nov 27 19:02:40 EST 2012
kill -USR1 18332
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18332 killed at Tue Nov 27 19:02:40 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:02:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18389 >/dev/null 2>/dev/null
selfserv with PID 18389 found at Tue Nov 27 19:02:40 EST 2012
selfserv with PID 18389 started at Tue Nov 27 19:02:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2931: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18389 at Tue Nov 27 19:02:40 EST 2012
kill -USR1 18389
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18389 killed at Tue Nov 27 19:02:40 EST 2012
ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:02:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18452 >/dev/null 2>/dev/null
selfserv with PID 18452 found at Tue Nov 27 19:02:40 EST 2012
selfserv with PID 18452 started at Tue Nov 27 19:02:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2932: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18452 at Tue Nov 27 19:02:40 EST 2012
kill -USR1 18452
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18452 killed at Tue Nov 27 19:02:40 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:02:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18509 >/dev/null 2>/dev/null
selfserv with PID 18509 found at Tue Nov 27 19:02:40 EST 2012
selfserv with PID 18509 started at Tue Nov 27 19:02:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2933: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18509 at Tue Nov 27 19:02:42 EST 2012
kill -USR1 18509
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18509 killed at Tue Nov 27 19:02:42 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:02:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18566 >/dev/null 2>/dev/null
selfserv with PID 18566 found at Tue Nov 27 19:02:43 EST 2012
selfserv with PID 18566 started at Tue Nov 27 19:02:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2934: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18566 at Tue Nov 27 19:02:43 EST 2012
kill -USR1 18566
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18566 killed at Tue Nov 27 19:02:43 EST 2012
ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:02:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18629 >/dev/null 2>/dev/null
selfserv with PID 18629 found at Tue Nov 27 19:02:43 EST 2012
selfserv with PID 18629 started at Tue Nov 27 19:02:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2935: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18629 at Tue Nov 27 19:02:43 EST 2012
kill -USR1 18629
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18629 killed at Tue Nov 27 19:02:43 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:02:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18686 >/dev/null 2>/dev/null
selfserv with PID 18686 found at Tue Nov 27 19:02:43 EST 2012
selfserv with PID 18686 started at Tue Nov 27 19:02:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2936: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18686 at Tue Nov 27 19:02:45 EST 2012
kill -USR1 18686
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18686 killed at Tue Nov 27 19:02:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:02:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18743 >/dev/null 2>/dev/null
selfserv with PID 18743 found at Tue Nov 27 19:02:45 EST 2012
selfserv with PID 18743 started at Tue Nov 27 19:02:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2937: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18743 at Tue Nov 27 19:02:45 EST 2012
kill -USR1 18743
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18743 killed at Tue Nov 27 19:02:45 EST 2012
ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:02:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18806 >/dev/null 2>/dev/null
selfserv with PID 18806 found at Tue Nov 27 19:02:46 EST 2012
selfserv with PID 18806 started at Tue Nov 27 19:02:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2938: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18806 at Tue Nov 27 19:02:46 EST 2012
kill -USR1 18806
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18806 killed at Tue Nov 27 19:02:46 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:02:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18863 >/dev/null 2>/dev/null
selfserv with PID 18863 found at Tue Nov 27 19:02:46 EST 2012
selfserv with PID 18863 started at Tue Nov 27 19:02:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2939: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18863 at Tue Nov 27 19:02:48 EST 2012
kill -USR1 18863
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18863 killed at Tue Nov 27 19:02:48 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:02:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18920 >/dev/null 2>/dev/null
selfserv with PID 18920 found at Tue Nov 27 19:02:48 EST 2012
selfserv with PID 18920 started at Tue Nov 27 19:02:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2940: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18920 at Tue Nov 27 19:02:48 EST 2012
kill -USR1 18920
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18920 killed at Tue Nov 27 19:02:48 EST 2012
ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:02:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18996 >/dev/null 2>/dev/null
selfserv with PID 18996 found at Tue Nov 27 19:02:48 EST 2012
selfserv with PID 18996 started at Tue Nov 27 19:02:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
Incorrect password/PIN entered.
tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #2941: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18996 at Tue Nov 27 19:02:50 EST 2012
kill -USR1 18996
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18996 killed at Tue Nov 27 19:02:50 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:02:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19053 >/dev/null 2>/dev/null
selfserv with PID 19053 found at Tue Nov 27 19:02:51 EST 2012
selfserv with PID 19053 started at Tue Nov 27 19:02:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2942: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19053 at Tue Nov 27 19:02:51 EST 2012
kill -USR1 19053
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19053 killed at Tue Nov 27 19:02:51 EST 2012
ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:02:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19114 >/dev/null 2>/dev/null
selfserv with PID 19114 found at Tue Nov 27 19:02:51 EST 2012
selfserv with PID 19114 started at Tue Nov 27 19:02:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2943: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19114 at Tue Nov 27 19:02:54 EST 2012
kill -USR1 19114
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19114 killed at Tue Nov 27 19:02:54 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:02:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19171 >/dev/null 2>/dev/null
selfserv with PID 19171 found at Tue Nov 27 19:02:54 EST 2012
selfserv with PID 19171 started at Tue Nov 27 19:02:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2944: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19171 at Tue Nov 27 19:02:54 EST 2012
kill -USR1 19171
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19171 killed at Tue Nov 27 19:02:54 EST 2012
ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:02:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19232 >/dev/null 2>/dev/null
selfserv with PID 19232 found at Tue Nov 27 19:02:54 EST 2012
selfserv with PID 19232 started at Tue Nov 27 19:02:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2945: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19232 at Tue Nov 27 19:02:57 EST 2012
kill -USR1 19232
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19232 killed at Tue Nov 27 19:02:57 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:02:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19289 >/dev/null 2>/dev/null
selfserv with PID 19289 found at Tue Nov 27 19:02:57 EST 2012
selfserv with PID 19289 started at Tue Nov 27 19:02:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2946: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19289 at Tue Nov 27 19:02:57 EST 2012
kill -USR1 19289
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19289 killed at Tue Nov 27 19:02:57 EST 2012
ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:02:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19350 >/dev/null 2>/dev/null
selfserv with PID 19350 found at Tue Nov 27 19:02:57 EST 2012
selfserv with PID 19350 started at Tue Nov 27 19:02:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2947: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19350 at Tue Nov 27 19:02:59 EST 2012
kill -USR1 19350
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19350 killed at Tue Nov 27 19:02:59 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:02:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19407 >/dev/null 2>/dev/null
selfserv with PID 19407 found at Tue Nov 27 19:02:59 EST 2012
selfserv with PID 19407 started at Tue Nov 27 19:02:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2948: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19407 at Tue Nov 27 19:02:59 EST 2012
kill -USR1 19407
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19407 killed at Tue Nov 27 19:02:59 EST 2012
ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:02:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:02:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19468 >/dev/null 2>/dev/null
selfserv with PID 19468 found at Tue Nov 27 19:02:59 EST 2012
selfserv with PID 19468 started at Tue Nov 27 19:02:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2949: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19468 at Tue Nov 27 19:03:02 EST 2012
kill -USR1 19468
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19468 killed at Tue Nov 27 19:03:02 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:03:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19525 >/dev/null 2>/dev/null
selfserv with PID 19525 found at Tue Nov 27 19:03:02 EST 2012
selfserv with PID 19525 started at Tue Nov 27 19:03:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2950: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19525 at Tue Nov 27 19:03:02 EST 2012
kill -USR1 19525
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19525 killed at Tue Nov 27 19:03:02 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 19:03:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19603 >/dev/null 2>/dev/null
selfserv with PID 19603 found at Tue Nov 27 19:03:02 EST 2012
selfserv with PID 19603 started at Tue Nov 27 19:03:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2951: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19603 at Tue Nov 27 19:03:02 EST 2012
kill -USR1 19603
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19603 killed at Tue Nov 27 19:03:02 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 19:03:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19666 >/dev/null 2>/dev/null
selfserv with PID 19666 found at Tue Nov 27 19:03:02 EST 2012
selfserv with PID 19666 started at Tue Nov 27 19:03:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2952: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19666 at Tue Nov 27 19:03:02 EST 2012
kill -USR1 19666
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19666 killed at Tue Nov 27 19:03:02 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 19:03:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19729 >/dev/null 2>/dev/null
selfserv with PID 19729 found at Tue Nov 27 19:03:03 EST 2012
selfserv with PID 19729 started at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2953: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19729 at Tue Nov 27 19:03:03 EST 2012
kill -USR1 19729
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19729 killed at Tue Nov 27 19:03:03 EST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Tue Nov 27 19:03:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19792 >/dev/null 2>/dev/null
selfserv with PID 19792 found at Tue Nov 27 19:03:03 EST 2012
selfserv with PID 19792 started at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2954: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19792 at Tue Nov 27 19:03:03 EST 2012
kill -USR1 19792
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19792 killed at Tue Nov 27 19:03:03 EST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Tue Nov 27 19:03:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19855 >/dev/null 2>/dev/null
selfserv with PID 19855 found at Tue Nov 27 19:03:03 EST 2012
selfserv with PID 19855 started at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2955: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19855 at Tue Nov 27 19:03:03 EST 2012
kill -USR1 19855
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19855 killed at Tue Nov 27 19:03:03 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 19:03:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19918 >/dev/null 2>/dev/null
selfserv with PID 19918 found at Tue Nov 27 19:03:03 EST 2012
selfserv with PID 19918 started at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2956: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19918 at Tue Nov 27 19:03:03 EST 2012
kill -USR1 19918
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19918 killed at Tue Nov 27 19:03:03 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 19:03:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19981 >/dev/null 2>/dev/null
selfserv with PID 19981 found at Tue Nov 27 19:03:03 EST 2012
selfserv with PID 19981 started at Tue Nov 27 19:03:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2957: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19981 at Tue Nov 27 19:03:04 EST 2012
kill -USR1 19981
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19981 killed at Tue Nov 27 19:03:04 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Tue Nov 27 19:03:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20044 >/dev/null 2>/dev/null
selfserv with PID 20044 found at Tue Nov 27 19:03:04 EST 2012
selfserv with PID 20044 started at Tue Nov 27 19:03:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #2958: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20044 at Tue Nov 27 19:03:04 EST 2012
kill -USR1 20044
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20044 killed at Tue Nov 27 19:03:04 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Tue Nov 27 19:03:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20107 >/dev/null 2>/dev/null
selfserv with PID 20107 found at Tue Nov 27 19:03:04 EST 2012
selfserv with PID 20107 started at Tue Nov 27 19:03:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02-sni1.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2959: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20107 at Tue Nov 27 19:03:04 EST 2012
kill -USR1 20107
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20107 killed at Tue Nov 27 19:03:04 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 19:03:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20170 >/dev/null 2>/dev/null
selfserv with PID 20170 found at Tue Nov 27 19:03:04 EST 2012
selfserv with PID 20170 started at Tue Nov 27 19:03:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2960: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20170 at Tue Nov 27 19:03:04 EST 2012
kill -USR1 20170
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20170 killed at Tue Nov 27 19:03:04 EST 2012
ssl.sh: SSL Stress Test - server normal/client fips - with ECC ===============================
ssl.sh: skipping Form is subject to the terms of the Mozilla Public (non-FIPS only)
ssl.sh: skipping If a copy of the MPL was not distributed with this (non-FIPS only)
ssl.sh: skipping obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only)
ssl.sh: skipping (non-FIPS only)
ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only)
ssl.sh: skipping (non-FIPS only)
ssl.sh: skipping (non-FIPS only)
ssl.sh: skipping client Test Case name (non-FIPS only)
ssl.sh: skipping params (non-FIPS only)
ssl.sh: skipping ------ --------------- (non-FIPS only)
ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only)
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only)
ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only)
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only)
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only)
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) (non-FIPS only)
ssl.sh: skipping (non-FIPS only)
ssl.sh: skipping versions here... (non-FIPS only)
ssl.sh: skipping (non-FIPS only)
ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:03:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20325 >/dev/null 2>/dev/null
selfserv with PID 20325 found at Tue Nov 27 19:03:05 EST 2012
selfserv with PID 20325 started at Tue Nov 27 19:03:05 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:03:05 EST 2012
ssl.sh: #2961: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 20325 at Tue Nov 27 19:03:05 EST 2012
kill -USR1 20325
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20325 killed at Tue Nov 27 19:03:05 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:03:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20400 >/dev/null 2>/dev/null
selfserv with PID 20400 found at Tue Nov 27 19:03:05 EST 2012
selfserv with PID 20400 started at Tue Nov 27 19:03:05 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 100 -C c -N -n TestUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:03:06 EST 2012
ssl.sh: #2962: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 20400 at Tue Nov 27 19:03:06 EST 2012
kill -USR1 20400
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20400 killed at Tue Nov 27 19:03:06 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:03:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20475 >/dev/null 2>/dev/null
selfserv with PID 20475 found at Tue Nov 27 19:03:06 EST 2012
selfserv with PID 20475 started at Tue Nov 27 19:03:06 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:06 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:03:06 EST 2012
ssl.sh: #2963: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 20475 at Tue Nov 27 19:03:06 EST 2012
kill -USR1 20475
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20475 killed at Tue Nov 27 19:03:06 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:03:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20551 >/dev/null 2>/dev/null
selfserv with PID 20551 found at Tue Nov 27 19:03:06 EST 2012
selfserv with PID 20551 started at Tue Nov 27 19:03:06 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:06 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:03:07 EST 2012
ssl.sh: #2964: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 20551 at Tue Nov 27 19:03:07 EST 2012
kill -USR1 20551
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20551 killed at Tue Nov 27 19:03:07 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:03:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20627 >/dev/null 2>/dev/null
selfserv with PID 20627 found at Tue Nov 27 19:03:07 EST 2012
selfserv with PID 20627 started at Tue Nov 27 19:03:07 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:03:07 EST 2012
ssl.sh: #2965: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 20627 at Tue Nov 27 19:03:07 EST 2012
kill -USR1 20627
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20627 killed at Tue Nov 27 19:03:07 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:03:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20703 >/dev/null 2>/dev/null
selfserv with PID 20703 found at Tue Nov 27 19:03:07 EST 2012
selfserv with PID 20703 started at Tue Nov 27 19:03:07 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:03:07 EST 2012
ssl.sh: #2966: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 20703 at Tue Nov 27 19:03:07 EST 2012
kill -USR1 20703
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20703 killed at Tue Nov 27 19:03:07 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:03:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20779 >/dev/null 2>/dev/null
selfserv with PID 20779 found at Tue Nov 27 19:03:07 EST 2012
selfserv with PID 20779 started at Tue Nov 27 19:03:07 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:03:08 EST 2012
ssl.sh: #2967: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 20779 at Tue Nov 27 19:03:08 EST 2012
kill -USR1 20779
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20779 killed at Tue Nov 27 19:03:08 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 19:03:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20861 >/dev/null 2>/dev/null
selfserv with PID 20861 found at Tue Nov 27 19:03:08 EST 2012
selfserv with PID 20861 started at Tue Nov 27 19:03:08 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:08 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:03:08 EST 2012
ssl.sh: #2968: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 20861 at Tue Nov 27 19:03:08 EST 2012
kill -USR1 20861
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20861 killed at Tue Nov 27 19:03:08 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 19:03:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20943 >/dev/null 2>/dev/null
selfserv with PID 20943 found at Tue Nov 27 19:03:08 EST 2012
selfserv with PID 20943 started at Tue Nov 27 19:03:08 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:08 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Tue Nov 27 19:03:09 EST 2012
ssl.sh: #2969: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 20943 at Tue Nov 27 19:03:09 EST 2012
kill -USR1 20943
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20943 killed at Tue Nov 27 19:03:09 EST 2012
ssl.sh: skipping (non-FIPS only)
ssl.sh: skipping ############################ (non-FIPS only)
ssl.sh: skipping (non-FIPS only)
ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only)
ssl.sh: skipping (non-FIPS only)
ssl.sh: skipping versions here... (non-FIPS only)
ssl.sh: skipping (non-FIPS only)
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:03:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21067 >/dev/null 2>/dev/null
selfserv with PID 21067 found at Tue Nov 27 19:03:09 EST 2012
selfserv with PID 21067 started at Tue Nov 27 19:03:09 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:09 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:03:09 EST 2012
ssl.sh: #2970: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21067 at Tue Nov 27 19:03:09 EST 2012
kill -USR1 21067
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21067 killed at Tue Nov 27 19:03:09 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:03:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21142 >/dev/null 2>/dev/null
selfserv with PID 21142 found at Tue Nov 27 19:03:09 EST 2012
selfserv with PID 21142 started at Tue Nov 27 19:03:09 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:09 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:03:10 EST 2012
ssl.sh: #2971: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21142 at Tue Nov 27 19:03:10 EST 2012
kill -USR1 21142
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21142 killed at Tue Nov 27 19:03:10 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:03:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21218 >/dev/null 2>/dev/null
selfserv with PID 21218 found at Tue Nov 27 19:03:10 EST 2012
selfserv with PID 21218 started at Tue Nov 27 19:03:10 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 10 -C :C004 -N -n TestUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:10 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:03:10 EST 2012
ssl.sh: #2972: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21218 at Tue Nov 27 19:03:10 EST 2012
kill -USR1 21218
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21218 killed at Tue Nov 27 19:03:10 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:03:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21293 >/dev/null 2>/dev/null
selfserv with PID 21293 found at Tue Nov 27 19:03:10 EST 2012
selfserv with PID 21293 started at Tue Nov 27 19:03:10 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:10 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:03:11 EST 2012
ssl.sh: #2973: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21293 at Tue Nov 27 19:03:11 EST 2012
kill -USR1 21293
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21293 killed at Tue Nov 27 19:03:11 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:03:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21368 >/dev/null 2>/dev/null
selfserv with PID 21368 found at Tue Nov 27 19:03:11 EST 2012
selfserv with PID 21368 started at Tue Nov 27 19:03:11 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -c 100 -C :C013 -n TestUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:11 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Tue Nov 27 19:03:11 EST 2012
ssl.sh: #2974: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21368 at Tue Nov 27 19:03:11 EST 2012
kill -USR1 21368
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21368 killed at Tue Nov 27 19:03:11 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:03:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21444 >/dev/null 2>/dev/null
selfserv with PID 21444 found at Tue Nov 27 19:03:11 EST 2012
selfserv with PID 21444 started at Tue Nov 27 19:03:11 EST 2012
strsclnt -q -p 8543 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:11 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Tue Nov 27 19:03:11 EST 2012
ssl.sh: #2975: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 21444 at Tue Nov 27 19:03:11 EST 2012
kill -USR1 21444
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21444 killed at Tue Nov 27 19:03:11 EST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips - with ECC ===============================
selfserv starting at Tue Nov 27 19:03:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:11 EST 2012
selfserv with PID 21507 started at Tue Nov 27 19:03:11 EST 2012
ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2976: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2977: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2978: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2979: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2980: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2981: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2982: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2983: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2984: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2985: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2986: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2987: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2988: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2989: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2990: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2991: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2992: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2993: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2994: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2995: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2996: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2997: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2998: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2999: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3000: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3001: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3002: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3003: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3004: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3005: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3006: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3007: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3008: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3009: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3010: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3011: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3012: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3013: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3014: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3015: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 21507 at Tue Nov 27 19:03:20 EST 2012
kill -USR1 21507
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21507 killed at Tue Nov 27 19:03:20 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:03:20 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22730 >/dev/null 2>/dev/null
selfserv with PID 22730 found at Tue Nov 27 19:03:20 EST 2012
selfserv with PID 22730 started at Tue Nov 27 19:03:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3016: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22730 >/dev/null 2>/dev/null
selfserv with PID 22730 found at Tue Nov 27 19:03:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3017: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22730 >/dev/null 2>/dev/null
selfserv with PID 22730 found at Tue Nov 27 19:03:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3018: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22730 >/dev/null 2>/dev/null
selfserv with PID 22730 found at Tue Nov 27 19:03:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3019: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22730 >/dev/null 2>/dev/null
selfserv with PID 22730 found at Tue Nov 27 19:03:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3020: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22730 at Tue Nov 27 19:03:21 EST 2012
kill -USR1 22730
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22730 killed at Tue Nov 27 19:03:21 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:03:21 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:21 EST 2012
selfserv with PID 22878 started at Tue Nov 27 19:03:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3021: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3022: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3023: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3024: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3025: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3026: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3027: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3028: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3029: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3030: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3031: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3032: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3033: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3034: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3035: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22878 at Tue Nov 27 19:03:24 EST 2012
kill -USR1 22878
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22878 killed at Tue Nov 27 19:03:24 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:03:24 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23277 >/dev/null 2>/dev/null
selfserv with PID 23277 found at Tue Nov 27 19:03:24 EST 2012
selfserv with PID 23277 started at Tue Nov 27 19:03:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3036: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23277 >/dev/null 2>/dev/null
selfserv with PID 23277 found at Tue Nov 27 19:03:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3037: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23277 >/dev/null 2>/dev/null
selfserv with PID 23277 found at Tue Nov 27 19:03:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3038: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23277 >/dev/null 2>/dev/null
selfserv with PID 23277 found at Tue Nov 27 19:03:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3039: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23277 >/dev/null 2>/dev/null
selfserv with PID 23277 found at Tue Nov 27 19:03:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3040: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23277 at Tue Nov 27 19:03:25 EST 2012
kill -USR1 23277
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23277 killed at Tue Nov 27 19:03:25 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:03:25 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:25 EST 2012
selfserv with PID 23425 started at Tue Nov 27 19:03:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3041: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3042: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3043: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3044: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3045: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3046: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3047: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3048: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3049: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3050: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3051: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3052: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3053: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3054: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3055: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23425 at Tue Nov 27 19:03:29 EST 2012
kill -USR1 23425
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23425 killed at Tue Nov 27 19:03:29 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:03:29 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23810 >/dev/null 2>/dev/null
selfserv with PID 23810 found at Tue Nov 27 19:03:29 EST 2012
selfserv with PID 23810 started at Tue Nov 27 19:03:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3056: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23810 >/dev/null 2>/dev/null
selfserv with PID 23810 found at Tue Nov 27 19:03:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3057: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23810 >/dev/null 2>/dev/null
selfserv with PID 23810 found at Tue Nov 27 19:03:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3058: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23810 >/dev/null 2>/dev/null
selfserv with PID 23810 found at Tue Nov 27 19:03:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3059: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23810 >/dev/null 2>/dev/null
selfserv with PID 23810 found at Tue Nov 27 19:03:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3060: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23810 at Tue Nov 27 19:03:30 EST 2012
kill -USR1 23810
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23810 killed at Tue Nov 27 19:03:30 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:03:30 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23958 >/dev/null 2>/dev/null
selfserv with PID 23958 found at Tue Nov 27 19:03:30 EST 2012
selfserv with PID 23958 started at Tue Nov 27 19:03:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3061: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23958 >/dev/null 2>/dev/null
selfserv with PID 23958 found at Tue Nov 27 19:03:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3062: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23958 >/dev/null 2>/dev/null
selfserv with PID 23958 found at Tue Nov 27 19:03:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3063: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23958 >/dev/null 2>/dev/null
selfserv with PID 23958 found at Tue Nov 27 19:03:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3064: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23958 >/dev/null 2>/dev/null
selfserv with PID 23958 found at Tue Nov 27 19:03:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3065: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23958 at Tue Nov 27 19:03:31 EST 2012
kill -USR1 23958
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23958 killed at Tue Nov 27 19:03:31 EST 2012
ssl.sh: SSL Client Authentication Extended Test - server normal/client fips - with ECC ===============================
ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:03:31 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24163 >/dev/null 2>/dev/null
selfserv with PID 24163 found at Tue Nov 27 19:03:31 EST 2012
selfserv with PID 24163 started at Tue Nov 27 19:03:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3066: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24163 at Tue Nov 27 19:03:31 EST 2012
kill -USR1 24163
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24163 killed at Tue Nov 27 19:03:31 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:03:31 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24220 >/dev/null 2>/dev/null
selfserv with PID 24220 found at Tue Nov 27 19:03:31 EST 2012
selfserv with PID 24220 started at Tue Nov 27 19:03:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
Incorrect password/PIN entered.
tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3067: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24220 at Tue Nov 27 19:03:33 EST 2012
kill -USR1 24220
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24220 killed at Tue Nov 27 19:03:33 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:03:33 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:03:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3068: Waiting for Server - FAILED
kill -0 24277 >/dev/null 2>/dev/null
selfserv with PID 24277 found at Tue Nov 27 19:03:42 EST 2012
selfserv with PID 24277 started at Tue Nov 27 19:03:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3069: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 24277 at Tue Nov 27 19:03:42 EST 2012
kill -USR1 24277
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24277 killed at Tue Nov 27 19:03:42 EST 2012
ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:03:42 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:03:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3070: Waiting for Server - FAILED
kill -0 24352 >/dev/null 2>/dev/null
selfserv with PID 24352 found at Tue Nov 27 19:03:48 EST 2012
selfserv with PID 24352 started at Tue Nov 27 19:03:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3071: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24352 at Tue Nov 27 19:03:48 EST 2012
kill -USR1 24352
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24352 killed at Tue Nov 27 19:03:48 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:03:48 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:03:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3072: Waiting for Server - FAILED
kill -0 24421 >/dev/null 2>/dev/null
selfserv with PID 24421 found at Tue Nov 27 19:03:53 EST 2012
selfserv with PID 24421 started at Tue Nov 27 19:03:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3073: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24421 at Tue Nov 27 19:03:53 EST 2012
kill -USR1 24421
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24421 killed at Tue Nov 27 19:03:53 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:03:53 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:03:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3074: Waiting for Server - FAILED
kill -0 24490 >/dev/null 2>/dev/null
selfserv with PID 24490 found at Tue Nov 27 19:03:58 EST 2012
selfserv with PID 24490 started at Tue Nov 27 19:03:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3075: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 24490 at Tue Nov 27 19:03:58 EST 2012
kill -USR1 24490
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24490 killed at Tue Nov 27 19:03:58 EST 2012
ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:03:58 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:03:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3076: Waiting for Server - FAILED
kill -0 24565 >/dev/null 2>/dev/null
selfserv with PID 24565 found at Tue Nov 27 19:04:03 EST 2012
selfserv with PID 24565 started at Tue Nov 27 19:04:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3077: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24565 at Tue Nov 27 19:04:03 EST 2012
kill -USR1 24565
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24565 killed at Tue Nov 27 19:04:03 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:04:03 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:04:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3078: Waiting for Server - FAILED
kill -0 24644 >/dev/null 2>/dev/null
selfserv with PID 24644 found at Tue Nov 27 19:04:08 EST 2012
selfserv with PID 24644 started at Tue Nov 27 19:04:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3079: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24644 at Tue Nov 27 19:04:08 EST 2012
kill -USR1 24644
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24644 killed at Tue Nov 27 19:04:08 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:04:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:04:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3080: Waiting for Server - FAILED
kill -0 24713 >/dev/null 2>/dev/null
selfserv with PID 24713 found at Tue Nov 27 19:04:14 EST 2012
selfserv with PID 24713 started at Tue Nov 27 19:04:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3081: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 24713 at Tue Nov 27 19:04:14 EST 2012
kill -USR1 24713
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24713 killed at Tue Nov 27 19:04:14 EST 2012
ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:04:14 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:04:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3082: Waiting for Server - FAILED
kill -0 24788 >/dev/null 2>/dev/null
selfserv with PID 24788 found at Tue Nov 27 19:04:19 EST 2012
selfserv with PID 24788 started at Tue Nov 27 19:04:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3083: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24788 at Tue Nov 27 19:04:19 EST 2012
kill -USR1 24788
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24788 killed at Tue Nov 27 19:04:19 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:04:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:04:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3084: Waiting for Server - FAILED
kill -0 24857 >/dev/null 2>/dev/null
selfserv with PID 24857 found at Tue Nov 27 19:04:24 EST 2012
selfserv with PID 24857 started at Tue Nov 27 19:04:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3085: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24857 at Tue Nov 27 19:04:24 EST 2012
kill -USR1 24857
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24857 killed at Tue Nov 27 19:04:24 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:04:24 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:04:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3086: Waiting for Server - FAILED
kill -0 24926 >/dev/null 2>/dev/null
selfserv with PID 24926 found at Tue Nov 27 19:04:29 EST 2012
selfserv with PID 24926 started at Tue Nov 27 19:04:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3087: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 24926 at Tue Nov 27 19:04:29 EST 2012
kill -USR1 24926
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24926 killed at Tue Nov 27 19:04:29 EST 2012
ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:04:29 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:04:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3088: Waiting for Server - FAILED
kill -0 25001 >/dev/null 2>/dev/null
selfserv with PID 25001 found at Tue Nov 27 19:04:34 EST 2012
selfserv with PID 25001 started at Tue Nov 27 19:04:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3089: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25001 at Tue Nov 27 19:04:34 EST 2012
kill -USR1 25001
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25001 killed at Tue Nov 27 19:04:34 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:04:34 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:04:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3090: Waiting for Server - FAILED
kill -0 25070 >/dev/null 2>/dev/null
selfserv with PID 25070 found at Tue Nov 27 19:04:40 EST 2012
selfserv with PID 25070 started at Tue Nov 27 19:04:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3091: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25070 at Tue Nov 27 19:04:40 EST 2012
kill -USR1 25070
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25070 killed at Tue Nov 27 19:04:40 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:04:40 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:04:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3092: Waiting for Server - FAILED
kill -0 25139 >/dev/null 2>/dev/null
selfserv with PID 25139 found at Tue Nov 27 19:04:45 EST 2012
selfserv with PID 25139 started at Tue Nov 27 19:04:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3093: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 25139 at Tue Nov 27 19:04:45 EST 2012
kill -USR1 25139
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25139 killed at Tue Nov 27 19:04:45 EST 2012
ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:04:45 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:04:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3094: Waiting for Server - FAILED
kill -0 25227 >/dev/null 2>/dev/null
selfserv with PID 25227 found at Tue Nov 27 19:04:50 EST 2012
selfserv with PID 25227 started at Tue Nov 27 19:04:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3095: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25227 at Tue Nov 27 19:04:50 EST 2012
kill -USR1 25227
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25227 killed at Tue Nov 27 19:04:50 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:04:50 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:04:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3096: Waiting for Server - FAILED
kill -0 25296 >/dev/null 2>/dev/null
selfserv with PID 25296 found at Tue Nov 27 19:04:55 EST 2012
selfserv with PID 25296 started at Tue Nov 27 19:04:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3097: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 25296 at Tue Nov 27 19:04:55 EST 2012
kill -USR1 25296
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25296 killed at Tue Nov 27 19:04:55 EST 2012
ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:04:55 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:04:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3098: Waiting for Server - FAILED
kill -0 25369 >/dev/null 2>/dev/null
selfserv with PID 25369 found at Tue Nov 27 19:05:01 EST 2012
selfserv with PID 25369 started at Tue Nov 27 19:05:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3099: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25369 at Tue Nov 27 19:05:01 EST 2012
kill -USR1 25369
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25369 killed at Tue Nov 27 19:05:01 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:05:01 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:05:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3100: Waiting for Server - FAILED
kill -0 25438 >/dev/null 2>/dev/null
selfserv with PID 25438 found at Tue Nov 27 19:05:06 EST 2012
selfserv with PID 25438 started at Tue Nov 27 19:05:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V :ssl3 -n ExtendedSSLUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3101: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 25438 at Tue Nov 27 19:05:06 EST 2012
kill -USR1 25438
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25438 killed at Tue Nov 27 19:05:06 EST 2012
ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:05:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:05:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3102: Waiting for Server - FAILED
kill -0 25511 >/dev/null 2>/dev/null
selfserv with PID 25511 found at Tue Nov 27 19:05:11 EST 2012
selfserv with PID 25511 started at Tue Nov 27 19:05:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3103: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25511 at Tue Nov 27 19:05:11 EST 2012
kill -USR1 25511
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25511 killed at Tue Nov 27 19:05:11 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:05:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:05:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3104: Waiting for Server - FAILED
kill -0 25580 >/dev/null 2>/dev/null
selfserv with PID 25580 found at Tue Nov 27 19:05:16 EST 2012
selfserv with PID 25580 started at Tue Nov 27 19:05:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3: -w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3105: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 25580 at Tue Nov 27 19:05:16 EST 2012
kill -USR1 25580
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25580 killed at Tue Nov 27 19:05:16 EST 2012
ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:05:16 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:05:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3106: Waiting for Server - FAILED
kill -0 25653 >/dev/null 2>/dev/null
selfserv with PID 25653 found at Tue Nov 27 19:05:21 EST 2012
selfserv with PID 25653 started at Tue Nov 27 19:05:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3107: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25653 at Tue Nov 27 19:05:21 EST 2012
kill -USR1 25653
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25653 killed at Tue Nov 27 19:05:21 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:05:21 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:05:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3108: Waiting for Server - FAILED
kill -0 25722 >/dev/null 2>/dev/null
selfserv with PID 25722 found at Tue Nov 27 19:05:26 EST 2012
selfserv with PID 25722 started at Tue Nov 27 19:05:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3109: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 25722 at Tue Nov 27 19:05:27 EST 2012
kill -USR1 25722
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25722 killed at Tue Nov 27 19:05:27 EST 2012
ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:05:27 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:05:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3110: Waiting for Server - FAILED
kill -0 25795 >/dev/null 2>/dev/null
selfserv with PID 25795 found at Tue Nov 27 19:05:32 EST 2012
selfserv with PID 25795 started at Tue Nov 27 19:05:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3111: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25795 at Tue Nov 27 19:05:32 EST 2012
kill -USR1 25795
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25795 killed at Tue Nov 27 19:05:32 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:05:32 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:05:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3112: Waiting for Server - FAILED
kill -0 25864 >/dev/null 2>/dev/null
selfserv with PID 25864 found at Tue Nov 27 19:05:37 EST 2012
selfserv with PID 25864 started at Tue Nov 27 19:05:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3113: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 25864 at Tue Nov 27 19:05:37 EST 2012
kill -USR1 25864
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25864 killed at Tue Nov 27 19:05:37 EST 2012
ssl.sh: skipping TLS Server hello response without SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI for Extended Test
ssl.sh: skipping TLS Server response with alert for Extended Test
ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping TLS Server hello response without SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server normal/client fips - with ECC ===============================
ssl.sh: skipping Form is subject to the terms of the Mozilla Public (non-FIPS only)
ssl.sh: skipping If a copy of the MPL was not distributed with this (non-FIPS only)
ssl.sh: skipping obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only)
ssl.sh: skipping (non-FIPS only)
ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only)
ssl.sh: skipping (non-FIPS only)
ssl.sh: skipping (non-FIPS only)
ssl.sh: skipping client Test Case name (non-FIPS only)
ssl.sh: skipping params (non-FIPS only)
ssl.sh: skipping ------ --------------- (non-FIPS only)
ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only)
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only)
ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only)
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only)
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only)
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping (non-FIPS only)
ssl.sh: skipping versions here... (non-FIPS only)
ssl.sh: skipping (non-FIPS only)
ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:05:37 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:05:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3114: Waiting for Server - FAILED
kill -0 26065 >/dev/null 2>/dev/null
selfserv with PID 26065 found at Tue Nov 27 19:05:42 EST 2012
selfserv with PID 26065 started at Tue Nov 27 19:05:42 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:05:42 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt: NoReuse - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:05:42 EST 2012
ssl.sh: #3115: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED
trying to kill selfserv with PID 26065 at Tue Nov 27 19:05:42 EST 2012
kill -USR1 26065
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26065 killed at Tue Nov 27 19:05:42 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:05:42 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:05:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3116: Waiting for Server - FAILED
kill -0 26144 >/dev/null 2>/dev/null
selfserv with PID 26144 found at Tue Nov 27 19:05:47 EST 2012
selfserv with PID 26144 started at Tue Nov 27 19:05:47 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:05:47 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt: NoReuse - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:05:48 EST 2012
ssl.sh: #3117: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED
trying to kill selfserv with PID 26144 at Tue Nov 27 19:05:48 EST 2012
kill -USR1 26144
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26144 killed at Tue Nov 27 19:05:48 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:05:48 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:05:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3118: Waiting for Server - FAILED
kill -0 26223 >/dev/null 2>/dev/null
selfserv with PID 26223 found at Tue Nov 27 19:05:53 EST 2012
selfserv with PID 26223 started at Tue Nov 27 19:05:53 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:05:53 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:05:53 EST 2012
ssl.sh: #3119: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED
trying to kill selfserv with PID 26223 at Tue Nov 27 19:05:53 EST 2012
kill -USR1 26223
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26223 killed at Tue Nov 27 19:05:53 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:05:53 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:05:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3120: Waiting for Server - FAILED
kill -0 26302 >/dev/null 2>/dev/null
selfserv with PID 26302 found at Tue Nov 27 19:05:58 EST 2012
selfserv with PID 26302 started at Tue Nov 27 19:05:58 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:05:58 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:05:58 EST 2012
ssl.sh: #3121: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26302 at Tue Nov 27 19:05:58 EST 2012
kill -USR1 26302
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26302 killed at Tue Nov 27 19:05:58 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:05:58 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:05:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3122: Waiting for Server - FAILED
kill -0 26381 >/dev/null 2>/dev/null
selfserv with PID 26381 found at Tue Nov 27 19:06:03 EST 2012
selfserv with PID 26381 started at Tue Nov 27 19:06:03 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:03 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:03 EST 2012
ssl.sh: #3123: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26381 at Tue Nov 27 19:06:03 EST 2012
kill -USR1 26381
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26381 killed at Tue Nov 27 19:06:03 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:06:03 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:06:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3124: Waiting for Server - FAILED
kill -0 26470 >/dev/null 2>/dev/null
selfserv with PID 26470 found at Tue Nov 27 19:06:09 EST 2012
selfserv with PID 26470 started at Tue Nov 27 19:06:09 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:09 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:09 EST 2012
ssl.sh: #3125: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0. - FAILED
trying to kill selfserv with PID 26470 at Tue Nov 27 19:06:09 EST 2012
kill -USR1 26470
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26470 killed at Tue Nov 27 19:06:09 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:06:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:06:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3126: Waiting for Server - FAILED
kill -0 26549 >/dev/null 2>/dev/null
selfserv with PID 26549 found at Tue Nov 27 19:06:14 EST 2012
selfserv with PID 26549 started at Tue Nov 27 19:06:14 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:14 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:14 EST 2012
ssl.sh: #3127: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0. - FAILED
trying to kill selfserv with PID 26549 at Tue Nov 27 19:06:14 EST 2012
kill -USR1 26549
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26549 killed at Tue Nov 27 19:06:14 EST 2012
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: skipping (non-FIPS only)
ssl.sh: skipping ############################ (non-FIPS only)
ssl.sh: skipping (non-FIPS only)
ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only)
ssl.sh: skipping (non-FIPS only)
ssl.sh: skipping versions here... (non-FIPS only)
ssl.sh: skipping (non-FIPS only)
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:06:14 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:06:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3128: Waiting for Server - FAILED
kill -0 26684 >/dev/null 2>/dev/null
selfserv with PID 26684 found at Tue Nov 27 19:06:19 EST 2012
selfserv with PID 26684 started at Tue Nov 27 19:06:19 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:19 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt: NoReuse - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:19 EST 2012
ssl.sh: #3129: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED
trying to kill selfserv with PID 26684 at Tue Nov 27 19:06:19 EST 2012
kill -USR1 26684
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26684 killed at Tue Nov 27 19:06:19 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:06:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:06:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3130: Waiting for Server - FAILED
kill -0 26763 >/dev/null 2>/dev/null
selfserv with PID 26763 found at Tue Nov 27 19:06:25 EST 2012
selfserv with PID 26763 started at Tue Nov 27 19:06:25 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:25 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:25 EST 2012
ssl.sh: #3131: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26763 at Tue Nov 27 19:06:25 EST 2012
kill -USR1 26763
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26763 killed at Tue Nov 27 19:06:25 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:06:25 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:06:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3132: Waiting for Server - FAILED
kill -0 26842 >/dev/null 2>/dev/null
selfserv with PID 26842 found at Tue Nov 27 19:06:30 EST 2012
selfserv with PID 26842 started at Tue Nov 27 19:06:30 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:30 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt: NoReuse - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:30 EST 2012
ssl.sh: #3133: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED
trying to kill selfserv with PID 26842 at Tue Nov 27 19:06:30 EST 2012
kill -USR1 26842
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26842 killed at Tue Nov 27 19:06:30 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:06:30 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:06:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3134: Waiting for Server - FAILED
kill -0 26921 >/dev/null 2>/dev/null
selfserv with PID 26921 found at Tue Nov 27 19:06:35 EST 2012
selfserv with PID 26921 started at Tue Nov 27 19:06:35 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:35 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt: NoReuse - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:35 EST 2012
ssl.sh: #3135: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0. - FAILED
trying to kill selfserv with PID 26921 at Tue Nov 27 19:06:35 EST 2012
kill -USR1 26921
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26921 killed at Tue Nov 27 19:06:35 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:06:35 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:06:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3136: Waiting for Server - FAILED
kill -0 27000 >/dev/null 2>/dev/null
selfserv with PID 27000 found at Tue Nov 27 19:06:40 EST 2012
selfserv with PID 27000 started at Tue Nov 27 19:06:40 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:40 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:41 EST 2012
ssl.sh: #3137: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 27000 at Tue Nov 27 19:06:41 EST 2012
kill -USR1 27000
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27000 killed at Tue Nov 27 19:06:41 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:06:41 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:06:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3138: Waiting for Server - FAILED
kill -0 27079 >/dev/null 2>/dev/null
selfserv with PID 27079 found at Tue Nov 27 19:06:46 EST 2012
selfserv with PID 27079 started at Tue Nov 27 19:06:46 EST 2012
strsclnt -q -p 8543 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:46 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:46 EST 2012
ssl.sh: #3139: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0. - FAILED
trying to kill selfserv with PID 27079 at Tue Nov 27 19:06:46 EST 2012
kill -USR1 27079
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27079 killed at Tue Nov 27 19:06:46 EST 2012
ssl.sh: SSL - FIPS mode off for client ===============================
ssl.sh: Turning FIPS off for the client
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -fips false -force
FIPS mode disabled.
ssl.sh: #3140: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -list
ssl.sh: #3141: (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #3142: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: Turning FIPS off for the extended client
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -fips false -force
FIPS mode disabled.
ssl.sh: #3143: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -list
ssl.sh: #3144: (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #3145: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
TIMESTAMP ssl END: Tue Nov 27 19:06:46 EST 2012
Running tests for ocsp
TIMESTAMP ocsp BEGIN: Tue Nov 27 19:06:46 EST 2012
ocsp.sh: OCSP tests ===============================
TIMESTAMP ocsp END: Tue Nov 27 19:06:46 EST 2012
Running tests for merge
TIMESTAMP merge BEGIN: Tue Nov 27 19:06:46 EST 2012
merge.sh: Merge Tests ===============================
merge.sh: Creating an SDR key & Encrypt
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v3.12297 -t Test2 -f ../tests.pw
merge.sh: #3146: Creating SDR Key - PASSED
merge.sh: Merging in Key for Existing user
certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3147: Merging Dave - PASSED
merge.sh: Merging in new user
certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3148: Merging server - PASSED
merge.sh: Merging in new chain
certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3149: Merging ext_client - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3150: Merging conflicting nicknames 1 - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3151: Merging conflicting nicknames 2 - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #4)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 45 (0x2d)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:49 2012
Not After : Mon Nov 27 23:55:49 2017
Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain
View,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
c4:fd:27:e3:74:a9:b3:71:3a:51:b8:78:9e:f5:59:aa:
3d:d9:b6:c6:64:12:ae:04:69:bf:52:0e:73:4f:72:b6:
ba:1e:85:75:97:8d:ec:27:ac:a4:71:6a:0f:88:75:0a:
37:b8:cb:08:c7:ff:28:27:b1:f5:cf:6f:a4:2d:26:b1:
d2:5d:8b:1f:7a:1e:e9:3c:57:05:c1:5e:16:61:9c:60:
88:57:c2:5c:7f:bf:4d:b7:31:7f:21:a4:cf:f6:ea:da:
43:e9:ce:99:01:c4:89:be:02:34:45:38:00:db:1a:d0:
24:5c:26:62:06:06:9d:c8:8b:33:04:f6:eb:2d:d5:4d
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
2b:73:d3:5a:47:c3:36:55:a3:3e:50:11:76:0b:7a:93:
13:ff:d3:b3:a4:59:07:35:7d:ea:4d:33:34:96:9c:bb:
3e:88:2a:d7:fc:ec:e1:a3:8a:27:25:d7:07:31:70:56:
9f:77:01:b8:f5:8d:0b:95:aa:97:bf:61:38:f2:15:62:
24:3a:92:77:6e:47:8f:85:dc:c5:2a:3a:33:b4:16:2c:
d7:29:54:3b:d8:2a:f3:31:14:a6:d0:4c:cf:0b:aa:11:
c3:8f:46:15:a6:6f:da:02:1a:98:c4:18:b9:93:fa:70:
e8:c8:6e:04:52:69:f9:e2:87:e1:77:aa:96:9f:0c:08
Fingerprint (MD5):
2A:C2:4C:91:7F:5E:7C:2B:88:66:DA:8F:20:7A:0F:B2
Fingerprint (SHA1):
6A:DC:C1:78:A4:DD:54:BC:A9:89:EA:3D:C6:3D:3D:6D:A4:96:0B:0D
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
merge.sh: #3152: Verify nicknames were deconflicted (Alice #4) - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #100)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 46 (0x2e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Tue Nov 27 23:55:50 2012
Not After : Mon Nov 27 23:55:50 2017
Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain
View,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
f3:26:a9:78:57:e0:f8:fb:76:ac:fe:47:ab:a3:45:6c:
f9:24:03:c5:9c:c0:5e:3f:cb:cd:fd:b2:51:a4:06:65:
5d:60:39:01:20:fb:fd:77:6c:e4:13:1c:0a:3c:9c:c2:
d4:81:ad:8e:8f:00:35:0f:70:39:d0:6b:07:7f:b2:72:
4e:05:dc:73:ac:8c:be:68:f5:de:87:74:0e:52:14:41:
a0:46:e1:f4:a5:54:7d:b0:e2:ee:6c:cc:3b:d8:12:69:
39:c3:d0:48:52:90:d6:8d:e5:1f:56:5e:da:5e:d6:71:
c2:7b:a4:69:39:2e:01:9b:c6:50:2a:6d:03:c4:6b:23
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
0b:d2:32:15:d7:17:f9:92:b9:c5:19:78:d1:83:5c:ba:
31:64:8a:32:97:e1:73:f4:d4:d4:4b:0b:94:19:91:8c:
dd:6e:e4:88:ec:16:90:f5:fc:13:84:7a:5a:3d:0c:df:
66:8d:2a:87:3b:65:33:da:d6:44:7b:74:00:8e:41:3d:
cb:b6:0b:df:51:f9:9b:0b:12:b8:cc:9d:b0:89:d7:06:
43:8b:2d:23:0f:86:9a:e4:05:a0:f5:8b:95:96:de:79:
55:dc:15:eb:69:6c:97:08:ce:52:7d:88:93:65:06:5f:
13:fb:3a:85:36:21:8e:f2:f1:e7:c2:1c:59:7f:72:7e
Fingerprint (MD5):
8C:7E:14:D4:4A:A7:5A:8A:60:61:66:30:DD:08:69:88
Fingerprint (SHA1):
84:B4:E5:49:EC:D3:08:A3:BD:2B:D0:11:CF:E3:C0:24:80:90:C2:09
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
merge.sh: #3153: Verify nicknames were deconflicted (Alice #100) - PASSED
merge.sh: Merging in SDR
certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3154: Merging SDR - PASSED
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
Alice-ec u,u,u
Dave u,u,u
chain-2-clientCA-ec ,,
Alice #1 ,,
buildnss02.usersys.redhat.com-ecmixed ,,
Alice #99 ,,
bob@bogus.com ,,
eve@bogus.com ,,
bob-ec@bogus.com ,,
buildnss02.usersys.redhat.com u,u,u
buildnss02.usersys.redhat.com-ec ,,
buildnss02-sni.usersys.redhat.com-ecmixed ,,
clientCA T,C,C
clientCA-ec T,C,C
Alice #3 ,,
TestCA CT,C,C
TestCA-ec CT,C,C
Alice-ecmixed u,u,u
Dave-ecmixed ,,
buildnss02-sni.usersys.redhat.com u,u,u
buildnss02-sni.usersys.redhat.com-ec ,,
ExtendedSSLUser u,u,u
serverCA C,C,C
ExtendedSSLUser-ec ,,
serverCA-ec C,C,C
chain-1-clientCA-ec ,,
chain-1-clientCA ,,
Alice #2 ,,
Alice #4 ,,
Alice u,u,u
Dave-ec ,,
ExtendedSSLUser-ecmixed ,,
chain-2-clientCA ,,
Alice #100 ,,
CRL names CRL Type
TestCA CRL
TestCA-ec CRL
merge.sh: Decrypt - With Original SDR Key
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v3.12297 -t Test2 -f ../tests.pw
merge.sh: #3155: Decrypt - Value 3 - PASSED
merge.sh: Decrypt - With Merged SDR Key
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v1.12297 -t Test1 -f ../tests.pw
merge.sh: #3156: Decrypt - Value 1 - PASSED
merge.sh: Signing with merged key ------------------
cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig
merge.sh: #3157: Create Detached Signature Dave . - PASSED
cmsutil -D -i dave.dsig -c alice.txt -d .
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com
This is a test message from Alice to Bob.
merge.sh: #3158: Verifying Dave's Detached Signature - PASSED
merge.sh: verifying merged cert ------------------
certutil -V -n ExtendedSSLUser -u C -d .
certutil: certificate is valid
merge.sh: #3159: Verifying ExtendedSSL User Cert - PASSED
merge.sh: verifying merged crl ------------------
crlutil -L -n TestCA -d .
CRL Info:
:
Version: 2 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US"
This Update: Tue Nov 27 23:55:59 2012
Entry 1 (0x1):
Serial Number: 40 (0x28)
Revocation Date: Tue Nov 27 23:55:14 2012
Entry Extensions:
Name: CRL reason code
Entry 2 (0x2):
Serial Number: 42 (0x2a)
Revocation Date: Tue Nov 27 23:55:57 2012
CRL Extensions:
Name: Certificate Issuer Alt Name
RFC822 Name: "caemail@ca.com"
DNS name: "ca.com"
Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo
rnia,C=US"
URI: "http://ca.com"
IP Address:
87:0b:31:39:32:2e:31:36:38:2e:30:2e:31
merge.sh: #3160: Verifying TestCA CRL - PASSED
TIMESTAMP merge END: Tue Nov 27 19:06:47 EST 2012
Running tests for pkits
TIMESTAMP pkits BEGIN: Tue Nov 27 19:06:47 EST 2012
pkits.sh Start of logfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/pkits.log
HOSTDIR /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1
PKITSDIR /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits
PKITSdb /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb
PKITSbkp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSbkp
PKITS_DATA /home/tinderbox/pkits/data/
certs /home/tinderbox/pkits/data//certs
crls /home/tinderbox/pkits/data//crls
***************************************************************
NIST PKITS Section 4.1: Signature Verification
***************************************************************
--------------------------------------------------------------------
Test case Valid Signatures Test1
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidCertificatePathTest1EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #3161: Valid Signatures Test1 - PASSED
pkits.sh SUCCESS: Valid Signatures Test1 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid CA Signature Test2
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n BadSignedCACert -i /home/tinderbox/pkits/data//certs/BadSignedCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadSignedCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidCASignatureTest2EE.crt /home/tinderbox/pkits/data//certs/BadSignedCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. BadSignedCACert [Certificate Authority]:
ERROR -8182: Peer's certificate has an invalid signature.
pkits.sh: #3162: Invalid CA Signature Test2 (2) - PASSED
pkits.sh SUCCESS: Invalid CA Signature Test2 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid EE Signature Test3
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidEESignatureTest3EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid EE Signature Test3,O=Test Certificates 2011,C=US :
ERROR -8182: Peer's certificate has an invalid signature.
pkits.sh: #3163: Invalid EE Signature Test3 (2) - PASSED
pkits.sh SUCCESS: Invalid EE Signature Test3 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid DSA Signatures Test4
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n DSACACert -i /home/tinderbox/pkits/data//certs/DSACACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSACACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDSASignaturesTest4EE.crt /home/tinderbox/pkits/data//certs/DSACACert.crt
Chain is good!
pkits.sh: #3164: Valid DSA Signatures Test4 - PASSED
pkits.sh SUCCESS: Valid DSA Signatures Test4 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Valid DSA Parameter Inheritance Test5
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n DSACACert -i /home/tinderbox/pkits/data//certs/DSACACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSACACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n DSAParametersInheritedCACert -i /home/tinderbox/pkits/data//certs/DSAParametersInheritedCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSAParametersInheritedCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDSAParameterInheritanceTest5EE.crt /home/tinderbox/pkits/data//certs/DSAParametersInheritedCACert.crt /home/tinderbox/pkits/data//certs/DSACACert.crt
Chain is good!
pkits.sh: #3165: Valid DSA Parameter Inheritance Test5 - PASSED
pkits.sh SUCCESS: Valid DSA Parameter Inheritance Test5 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid DSA Signature Test6
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n DSACACert -i /home/tinderbox/pkits/data//certs/DSACACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSACACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDSASignatureTest6EE.crt /home/tinderbox/pkits/data//certs/DSACACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid DSA Signature EE Certificate Test6,O=Test Certificates 2011,C=US :
ERROR -8182: Peer's certificate has an invalid signature.
pkits.sh: #3166: Invalid DSA Signature Test6 (2) - PASSED
pkits.sh SUCCESS: Invalid DSA Signature Test6 returned as expected 2
Restore DB
***************************************************************
NIST PKITS Section 4.2: Validity Periods
***************************************************************
--------------------------------------------------------------------
Test case Invalid CA notBefore Date Test1
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n BadnotBeforeDateCACert -i /home/tinderbox/pkits/data//certs/BadnotBeforeDateCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadnotBeforeDateCACRL.crl
crlutil: unable to import CRL: The CRL for the certificate's issuer has an invalid signature.
pkits.sh: #3167: Invalid CA notBefore Date Test1 (1) - PASSED
pkits.sh SUCCESS: Invalid CA notBefore Date Test1 returned as expected 1
Restore DB
--------------------------------------------------------------------
Test case Invalid EE notBefore Date Test2
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidEEnotBeforeDateTest2EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid EE notBefore Date EE Certificate Test2,O=Test Certificates 2011,C=US :
ERROR -8181: Peer's Certificate has expired.
pkits.sh: #3168: Invalid EE notBefore Date Test2 (2) - PASSED
pkits.sh SUCCESS: Invalid EE notBefore Date Test2 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid pre2000 UTC notBefore Date Test3
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/Validpre2000UTCnotBeforeDateTest3EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #3169: Valid pre2000 UTC notBefore Date Test3 - PASSED
pkits.sh SUCCESS: Valid pre2000 UTC notBefore Date Test3 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Valid GeneralizedTime notBefore Date Test4
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidGeneralizedTimenotBeforeDateTest4EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #3170: Valid GeneralizedTime notBefore Date Test4 - PASSED
pkits.sh SUCCESS: Valid GeneralizedTime notBefore Date Test4 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid CA notAfter Date Test5
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n BadnotAfterDateCACert -i /home/tinderbox/pkits/data//certs/BadnotAfterDateCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadnotAfterDateCACRL.crl
crlutil: unable to import CRL: The CRL for the certificate's issuer has an invalid signature.
pkits.sh: #3171: Invalid CA notAfter Date Test5 (1) - PASSED
pkits.sh SUCCESS: Invalid CA notAfter Date Test5 returned as expected 1
Restore DB
--------------------------------------------------------------------
Test case Invalid EE notAfter Date Test6
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidEEnotAfterDateTest6EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid EE notAfter Date EE Certificate Test6,O=Test Certificates 2011,C=US :
ERROR -8181: Peer's Certificate has expired.
pkits.sh: #3172: Invalid EE notAfter Date Test6 (2) - PASSED
pkits.sh SUCCESS: Invalid EE notAfter Date Test6 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid pre2000 UTC EE notAfter Date Test7
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/Invalidpre2000UTCEEnotAfterDateTest7EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid pre2000 UTC EE notAfter Date EE Certificate Test7,O=Test Certificates 2011,C=US :
ERROR -8181: Peer's Certificate has expired.
pkits.sh: #3173: Invalid pre2000 UTC EE notAfter Date Test7 (2) - PASSED
pkits.sh SUCCESS: Invalid pre2000 UTC EE notAfter Date Test7 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case ValidGeneralizedTime notAfter Date Test8
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidGeneralizedTimenotAfterDateTest8EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #3174: ValidGeneralizedTime notAfter Date Test8 - PASSED
pkits.sh SUCCESS: ValidGeneralizedTime notAfter Date Test8 returned as expected 0
Restore DB
***************************************************************
NIST PKITS Section 4.3: Verifying NameChaining
***************************************************************
--------------------------------------------------------------------
Test case Invalid Name Chaining EE Test1
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidNameChainingTest1EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Name Chaining EE Certificate Test1,O=Test Certificates 2011,C=US :
ERROR -8179: Peer's Certificate issuer is not recognized.
CN=Good CA Root,O=Test Certificates 2011,C=US
pkits.sh: #3175: Invalid Name Chaining EE Test1 (2) - PASSED
pkits.sh SUCCESS: Invalid Name Chaining EE Test1 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid Name Chaining Order Test2
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n NameOrderingCACert -i /home/tinderbox/pkits/data//certs/NameOrderingCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/NameOrderCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidNameChainingOrderTest2EE.crt /home/tinderbox/pkits/data//certs/NameOrderingCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Name Chaining Order EE Certificate Test2,O=Test Certificates 2011,C=US :
ERROR -8179: Peer's Certificate issuer is not recognized.
CN=Name Ordering CA,OU=Organizational Unit Name 1,OU=Organizational Unit Name 2,O=Test Certificates 2011,C=US
pkits.sh: #3176: Invalid Name Chaining Order Test2 (2) - PASSED
pkits.sh SUCCESS: Invalid Name Chaining Order Test2 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid Name Chaining UIDs Test6
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n UIDCACert -i /home/tinderbox/pkits/data//certs/UIDCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UIDCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidNameUIDsTest6EE.crt /home/tinderbox/pkits/data//certs/UIDCACert.crt
Chain is good!
pkits.sh: #3177: Valid Name Chaining UIDs Test6 - PASSED
pkits.sh SUCCESS: Valid Name Chaining UIDs Test6 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Valid RFC3280 Mandatory Attribute Types Test7
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n RFC3280MandatoryAttributeTypesCACert -i /home/tinderbox/pkits/data//certs/RFC3280MandatoryAttributeTypesCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/RFC3280MandatoryAttributeTypesCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crt /home/tinderbox/pkits/data//certs/RFC3280MandatoryAttributeTypesCACert.crt
Chain is good!
pkits.sh: #3178: Valid RFC3280 Mandatory Attribute Types Test7 - PASSED
pkits.sh SUCCESS: Valid RFC3280 Mandatory Attribute Types Test7 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Valid RFC3280 Optional Attribute Types Test8
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n RFC3280OptionalAttributeTypesCACert -i /home/tinderbox/pkits/data//certs/RFC3280OptionalAttributeTypesCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/RFC3280OptionalAttributeTypesCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC3280OptionalAttributeTypesTest8EE.crt /home/tinderbox/pkits/data//certs/RFC3280OptionalAttributeTypesCACert.crt
Chain is good!
pkits.sh: #3179: Valid RFC3280 Optional Attribute Types Test8 - PASSED
pkits.sh SUCCESS: Valid RFC3280 Optional Attribute Types Test8 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Valid UTF8String Encoded Names Test9
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n UTF8StringEncodedNamesCACert -i /home/tinderbox/pkits/data//certs/UTF8StringEncodedNamesCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UTF8StringEncodedNamesCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidUTF8StringEncodedNamesTest9EE.crt /home/tinderbox/pkits/data//certs/UTF8StringEncodedNamesCACert.crt
Chain is good!
pkits.sh: #3180: Valid UTF8String Encoded Names Test9 - PASSED
pkits.sh SUCCESS: Valid UTF8String Encoded Names Test9 returned as expected 0
Restore DB
***************************************************************
NIST PKITS Section 4.4: Basic Certificate Revocation Tests
***************************************************************
--------------------------------------------------------------------
Test case Invalid Revoked CA Test2
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n RevokedsubCACert -i /home/tinderbox/pkits/data//certs/RevokedsubCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/RevokedsubCACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRevokedCATest2EE.crt /home/tinderbox/pkits/data//certs/RevokedsubCACert.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. RevokedsubCACert [Certificate Authority]:
ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #3181: Invalid Revoked CA Test2 (2) - PASSED
pkits.sh SUCCESS: Invalid Revoked CA Test2 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid Revoked EE Test3
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRevokedEETest3EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Revoked EE Certificate Test3,O=Test Certificates 2011,C=US :
ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #3182: Invalid Revoked EE Test3 (2) - PASSED
pkits.sh SUCCESS: Invalid Revoked EE Test3 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid Bad CRL Signature Test4
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n BadCRLSignatureCACert -i /home/tinderbox/pkits/data//certs/BadCRLSignatureCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadCRLSignatureCACRL.crl
crlutil: unable to import CRL: The CRL for the certificate's issuer has an invalid signature.
pkits.sh: #3183: Invalid Bad CRL Signature Test4 (1) - PASSED
pkits.sh SUCCESS: Invalid Bad CRL Signature Test4 returned as expected 1
Restore DB
--------------------------------------------------------------------
Test case Invalid Bad CRL Issuer Name Test5
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n BadCRLIssuerNameCACert -i /home/tinderbox/pkits/data//certs/BadCRLIssuerNameCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadCRLIssuerNameCACRL.crl
crlutil: unable to import CRL: Peer's Certificate issuer is not recognized.
pkits.sh: #3184: Invalid Bad CRL Issuer Name Test5 (1) - PASSED
pkits.sh SUCCESS: Invalid Bad CRL Issuer Name Test5 returned as expected 1
Restore DB
--------------------------------------------------------------------
Test case Valid Two CRLs Test7
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n TwoCRLsCACert -i /home/tinderbox/pkits/data//certs/TwoCRLsCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/TwoCRLsCAGoodCRL.crl
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/TwoCRLsCABadCRL.crl
crlutil: unable to import CRL: Peer's Certificate issuer is not recognized.
pkits.sh: #3185: Valid Two CRLs Test7 (1) - PASSED
pkits.sh SUCCESS: Valid Two CRLs Test7 returned as expected 1
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidTwoCRLsTest7EE.crt /home/tinderbox/pkits/data//certs/TwoCRLsCACert.crt
Chain is good!
pkits.sh: #3186: Valid Two CRLs Test7 - PASSED
pkits.sh SUCCESS: Valid Two CRLs Test7 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid Unknown CRL Entry Extension Test8
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n UnknownCRLEntryExtensionCACert -i /home/tinderbox/pkits/data//certs/UnknownCRLEntryExtensionCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UnknownCRLEntryExtensionCACRL.crl
crlutil: unable to import CRL: Issuer's V2 Certificate Revocation List has an unknown critical extension.
pkits.sh: #3187: Invalid Unknown CRL Entry Extension Test8 (1) - PASSED
pkits.sh SUCCESS: Invalid Unknown CRL Entry Extension Test8 returned as expected 1
Restore DB
--------------------------------------------------------------------
Test case Invalid Unknown CRL Extension Test9
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n UnknownCRLExtensionCACert -i /home/tinderbox/pkits/data//certs/UnknownCRLExtensionCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UnknownCRLExtensionCACRL.crl
crlutil: unable to import CRL: Issuer's V2 Certificate Revocation List has an unknown critical extension.
pkits.sh: #3188: Invalid Unknown CRL Extension Test9 (1) - PASSED
pkits.sh SUCCESS: Invalid Unknown CRL Extension Test9 returned as expected 1
Restore DB
--------------------------------------------------------------------
Test case Invalid Unknown CRL Extension Test10
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n UnknownCRLExtensionCACert -i /home/tinderbox/pkits/data//certs/UnknownCRLExtensionCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UnknownCRLExtensionCACRL.crl
crlutil: unable to import CRL: Issuer's V2 Certificate Revocation List has an unknown critical extension.
pkits.sh: #3189: Invalid Unknown CRL Extension Test10 (1) - PASSED
pkits.sh SUCCESS: Invalid Unknown CRL Extension Test10 returned as expected 1
Restore DB
--------------------------------------------------------------------
Test case Valid GeneralizedTime CRL nextUpdate Test13
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GeneralizedTimeCRLnextUpdateCACert -i /home/tinderbox/pkits/data//certs/GeneralizedTimeCRLnextUpdateCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GeneralizedTimeCRLnextUpdateCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidGeneralizedTimeCRLnextUpdateTest13EE.crt /home/tinderbox/pkits/data//certs/GeneralizedTimeCRLnextUpdateCACert.crt
Chain is good!
pkits.sh: #3190: Valid GeneralizedTime CRL nextUpdate Test13 - PASSED
pkits.sh SUCCESS: Valid GeneralizedTime CRL nextUpdate Test13 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Valid Negative Serial Number Test14
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n NegativeSerialNumberCACert -i /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/NegativeSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidNegativeSerialNumberTest14EE.crt /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
Chain is good!
pkits.sh: #3191: Valid Negative Serial Number Test14 - PASSED
pkits.sh SUCCESS: Valid Negative Serial Number Test14 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid Negative Serial Number Test15
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n NegativeSerialNumberCACert -i /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/NegativeSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidNegativeSerialNumberTest15EE.crt /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Negative Serial Number EE Certificate Test15,O=Test Certificates 2011,C=US :
ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #3192: Invalid Negative Serial Number Test15 (2) - PASSED
pkits.sh SUCCESS: Invalid Negative Serial Number Test15 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid Long Serial Number Test16
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n LongSerialNumberCACert -i /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/LongSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidLongSerialNumberTest16EE.crt /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
Chain is good!
pkits.sh: #3193: Valid Long Serial Number Test16 - PASSED
pkits.sh SUCCESS: Valid Long Serial Number Test16 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Valid Long Serial Number Test17
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n LongSerialNumberCACert -i /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/LongSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidLongSerialNumberTest17EE.crt /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
Chain is good!
pkits.sh: #3194: Valid Long Serial Number Test17 - PASSED
pkits.sh SUCCESS: Valid Long Serial Number Test17 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid Long Serial Number Test18
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n LongSerialNumberCACert -i /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/LongSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidLongSerialNumberTest18EE.crt /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Long Serial Number EE Certificate Test18,O=Test Certificates 2011,C=US :
ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #3195: Invalid Long Serial Number Test18 (2) - PASSED
pkits.sh SUCCESS: Invalid Long Serial Number Test18 returned as expected 2
Restore DB
***************************************************************
NIST PKITS Section 4.5: Self-Issued Certificates
***************************************************************
***************************************************************
NIST PKITS Section 4.6: Verifying Basic Constraints
***************************************************************
--------------------------------------------------------------------
Test case Invalid Missing basicConstraints Test1
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n MissingbasicConstraintsCACert -i /home/tinderbox/pkits/data//certs/MissingbasicConstraintsCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/MissingbasicConstraintsCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidMissingbasicConstraintsTest1EE.crt /home/tinderbox/pkits/data//certs/MissingbasicConstraintsCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Missing basicConstraints EE Certificate Test1,O=Test Certificates 2011,C=US :
ERROR -8179: Peer's Certificate issuer is not recognized.
CN=Missing basicConstraints CA,O=Test Certificates 2011,C=US
pkits.sh: #3196: Invalid Missing basicConstraints Test1 (2) - PASSED
pkits.sh SUCCESS: Invalid Missing basicConstraints Test1 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid cA False Test2
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n basicConstraintsCriticalcAFalseCACert -i /home/tinderbox/pkits/data//certs/basicConstraintsCriticalcAFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/basicConstraintsCriticalcAFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidcAFalseTest2EE.crt /home/tinderbox/pkits/data//certs/basicConstraintsCriticalcAFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid cA False EE Certificate Test2,O=Test Certificates 2011,C=US :
ERROR -8179: Peer's Certificate issuer is not recognized.
CN=basicConstraints Critical cA False CA,O=Test Certificates 2011,C=US
pkits.sh: #3197: Invalid cA False Test2 (2) - PASSED
pkits.sh SUCCESS: Invalid cA False Test2 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid cA False Test3
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n basicConstraintsNotCriticalcAFalseCACert -i /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalcAFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/basicConstraintsNotCriticalcAFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidcAFalseTest3EE.crt /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalcAFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid cA False EE Certificate Test3,O=Test Certificates 2011,C=US :
ERROR -8179: Peer's Certificate issuer is not recognized.
CN=basicConstraints Not Critical cA False CA,O=Test Certificates 2011,C=US
pkits.sh: #3198: Invalid cA False Test3 (2) - PASSED
pkits.sh SUCCESS: Invalid cA False Test3 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid basicConstraints Not Critical Test4
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n basicConstraintsNotCriticalCACert -i /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/basicConstraintsNotCriticalCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidbasicConstraintsNotCriticalTest4EE.crt /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalCACert.crt
Chain is good!
pkits.sh: #3199: Valid basicConstraints Not Critical Test4 - PASSED
pkits.sh SUCCESS: Valid basicConstraints Not Critical Test4 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test5
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0subCACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0subCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest5EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint0CACert [Certificate Authority]:
ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3200: Invalid pathLenConstraint Test5 (2) - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test5 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test6
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0subCACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0subCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest6EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint0CACert [Certificate Authority]:
ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3201: Invalid pathLenConstraint Test6 (2) - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test6 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid pathLenConstraint Test7
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest7EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is good!
pkits.sh: #3202: Valid pathLenConstraint Test7 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint Test7 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Valid pathLenConstraint test8
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest8EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is good!
pkits.sh: #3203: Valid pathLenConstraint test8 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint test8 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test9
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA0Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA0CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA00Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA00CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest9EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint6subCA0Cert [Certificate Authority]:
ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3204: Invalid pathLenConstraint Test9 (2) - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test9 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test10
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA0Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA0CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA00Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA00CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest10EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint6subCA0Cert [Certificate Authority]:
ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3205: Invalid pathLenConstraint Test10 (2) - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test10 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test11
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA1Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA1CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA11Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA11CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA11XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA11XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest11EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. pathLenConstraint6subCA1Cert [Certificate Authority]:
ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3206: Invalid pathLenConstraint Test11 (2) - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test11 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid pathLenConstraint test12
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA1Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA1CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA11Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA11CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA11XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA11XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest12EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. pathLenConstraint6subCA1Cert [Certificate Authority]:
ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3207: Invalid pathLenConstraint test12 (2) - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint test12 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid pathLenConstraint Test13
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA4Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA4CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA41Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA41CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA41XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA41XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest13EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is good!
pkits.sh: #3208: Valid pathLenConstraint Test13 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint Test13 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Valid pathLenConstraint Test14
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA4Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA4CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA41Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA41CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA41XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA41XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest14EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is good!
pkits.sh: #3209: Valid pathLenConstraint Test14 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint Test14 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid Self-Issued pathLenConstraint Test16
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0subCA2Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidSelfIssuedpathLenConstraintTest16EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0subCA2Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0SelfIssuedCACert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. pathLenConstraint0CACert [Certificate Authority]:
ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3210: Invalid Self-Issued pathLenConstraint Test16 (2) - PASSED
pkits.sh SUCCESS: Invalid Self-Issued pathLenConstraint Test16 returned as expected 2
Restore DB
***************************************************************
NIST PKITS Section 4.7: Key Usage
***************************************************************
--------------------------------------------------------------------
Test case Invalid keyUsage Critical keyCertSign False Test1
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n keyUsageCriticalkeyCertSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageCriticalkeyCertSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageCriticalkeyCertSignFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt /home/tinderbox/pkits/data//certs/keyUsageCriticalkeyCertSignFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. keyUsageCriticalkeyCertSignFalseCACert [Certificate Authority]:
ERROR -8102: Certificate key usage inadequate for attempted operation.
CN=Trust Anchor,O=Test Certificates 2011,C=US
pkits.sh: #3211: Invalid keyUsage Critical keyCertSign False Test1 (2) - PASSED
pkits.sh SUCCESS: Invalid keyUsage Critical keyCertSign False Test1 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid keyUsage Not Critical keyCertSign False Test2
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n keyUsageNotCriticalkeyCertSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageNotCriticalkeyCertSignFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt /home/tinderbox/pkits/data//certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. keyUsageNotCriticalkeyCertSignFalseCACert [Certificate Authority]:
ERROR -8102: Certificate key usage inadequate for attempted operation.
CN=Trust Anchor,O=Test Certificates 2011,C=US
pkits.sh: #3212: Invalid keyUsage Not Critical keyCertSign False Test2 (2) - PASSED
pkits.sh SUCCESS: Invalid keyUsage Not Critical keyCertSign False Test2 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid keyUsage Not Critical Test3
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n keyUsageNotCriticalCACert -i /home/tinderbox/pkits/data//certs/keyUsageNotCriticalCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageNotCriticalCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidkeyUsageNotCriticalTest3EE.crt /home/tinderbox/pkits/data//certs/keyUsageNotCriticalCACert.crt
Chain is good!
pkits.sh: #3213: Valid keyUsage Not Critical Test3 - PASSED
pkits.sh SUCCESS: Valid keyUsage Not Critical Test3 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid keyUsage Critical cRLSign False Test4
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n keyUsageCriticalcRLSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageCriticalcRLSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageCriticalcRLSignFalseCACRL.crl
crlutil: unable to import CRL: Certificate usages field is invalid.
pkits.sh: #3214: Invalid keyUsage Critical cRLSign False Test4 (1) - PASSED
pkits.sh SUCCESS: Invalid keyUsage Critical cRLSign False Test4 returned as expected 1
Restore DB
--------------------------------------------------------------------
Test case Invalid keyUsage Not Critical cRLSign False Test5
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n keyUsageNotCriticalcRLSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageNotCriticalcRLSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageNotCriticalcRLSignFalseCACRL.crl
crlutil: unable to import CRL: Certificate usages field is invalid.
pkits.sh: #3215: Invalid keyUsage Not Critical cRLSign False Test5 (1) - PASSED
pkits.sh SUCCESS: Invalid keyUsage Not Critical cRLSign False Test5 returned as expected 1
Restore DB
***************************************************************
NIST PKITS Section 4.13: Name Constraints
***************************************************************
--------------------------------------------------------------------
Test case Valid DN nameConstraints Test1
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest1EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #3216: Valid DN nameConstraints Test1 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test1 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test2
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest2EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test2,OU=excludedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3217: Invalid DN nameConstraints Test2 (2) - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test2 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test3
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest3EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test3,OU=permittedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3218: Invalid DN nameConstraints Test3 (2) - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test3 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid DN nameConstraints Test4
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest4EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #3219: Valid DN nameConstraints Test4 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test4 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Valid DN nameConstraints Test5
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest5EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN2CACert.crt
Chain is good!
pkits.sh: #3220: Valid DN nameConstraints Test5 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test5 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Valid DN nameConstraints Test6
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest6EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is good!
pkits.sh: #3221: Valid DN nameConstraints Test6 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test6 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test7
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest7EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test7,OU=excludedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3222: Invalid DN nameConstraints Test7 (2) - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test7 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test8
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN4CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN4CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest8EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test8,OU=excludedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3223: Invalid DN nameConstraints Test8 (2) - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test8 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test9
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN4CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN4CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest9EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test9,OU=excludedSubtree2,O=Test Certificates 2011,C=US [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3224: Invalid DN nameConstraints Test9 (2) - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test9 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test10
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN5CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN5CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest10EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test10,OU=excludedSubtree1,OU=permittedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3225: Invalid DN nameConstraints Test10 (2) - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test10 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid DN nameConstraints Test11
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN5CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN5CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest11EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
Chain is good!
pkits.sh: #3226: Valid DN nameConstraints Test11 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test11 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test12
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest12EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA1Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test12,OU=permittedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3227: Invalid DN nameConstraints Test12 (2) - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test12 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test13
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest13EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test13,OU=permittedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3228: Invalid DN nameConstraints Test13 (2) - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test13 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid DN nameConstraints Test14
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest14EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #3229: Valid DN nameConstraints Test14 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test14 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test15
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest15EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Invalid DN nameConstraints EE Certificate Test15,OU=excludedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3230: Invalid DN nameConstraints Test15 (2) - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test15 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test16
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest16EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test16,OU=excludedSubtree2,O=Test Certificates 2011,C=US [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3231: Invalid DN nameConstraints Test16 (2) - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test16 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test17
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest17EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Invalid DN nameConstraints EE Certificate Test17,OU=excludedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3232: Invalid DN nameConstraints Test17 (2) - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test17 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid DN nameConstraints Test18
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest18EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is good!
pkits.sh: #3233: Valid DN nameConstraints Test18 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test18 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid Self-Issued DN nameConstraints Test20
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest20EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=nameConstraints DN1 CA,O=Test Certificates 2011,C=US [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3234: Invalid Self-Issued DN nameConstraints Test20 (2) - PASSED
pkits.sh SUCCESS: Invalid Self-Issued DN nameConstraints Test20 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid RFC822 nameConstraints Test21
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC822nameConstraintsTest21EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
Chain is good!
pkits.sh: #3235: Valid RFC822 nameConstraints Test21 - PASSED
pkits.sh SUCCESS: Valid RFC822 nameConstraints Test21 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid RFC822 nameConstraints Test22
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRFC822nameConstraintsTest22EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. test22ee@testcertificates.gov [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3236: Invalid RFC822 nameConstraints Test22 (2) - PASSED
pkits.sh SUCCESS: Invalid RFC822 nameConstraints Test22 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid RFC822 nameConstraints Test23
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC822nameConstraintsTest23EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
Chain is good!
pkits.sh: #3237: Valid RFC822 nameConstraints Test23 - PASSED
pkits.sh SUCCESS: Valid RFC822 nameConstraints Test23 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid RFC822 nameConstraints Test24
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRFC822nameConstraintsTest24EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. test24ee@mailserver.testcertificates.gov [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3238: Invalid RFC822 nameConstraints Test24 (2) - PASSED
pkits.sh SUCCESS: Invalid RFC822 nameConstraints Test24 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid RFC822 nameConstraints Test25
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC822nameConstraintsTest25EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
Chain is good!
pkits.sh: #3239: Valid RFC822 nameConstraints Test25 - PASSED
pkits.sh SUCCESS: Valid RFC822 nameConstraints Test25 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid RFC822 nameConstraints Test26
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRFC822nameConstraintsTest26EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. test26ee@testcertificates.gov [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3240: Invalid RFC822 nameConstraints Test26 (2) - PASSED
pkits.sh SUCCESS: Invalid RFC822 nameConstraints Test26 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid DN and RFC822 nameConstraints Test27
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNandRFC822nameConstraintsTest27EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #3241: Valid DN and RFC822 nameConstraints Test27 - PASSED
pkits.sh SUCCESS: Valid DN and RFC822 nameConstraints Test27 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid DN and RFC822 nameConstraints Test28
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNandRFC822nameConstraintsTest28EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. test28ee@invalidcertificates.gov [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3242: Invalid DN and RFC822 nameConstraints Test28 (2) - PASSED
pkits.sh SUCCESS: Invalid DN and RFC822 nameConstraints Test28 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid DN and RFC822 nameConstraints Test29
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNandRFC822nameConstraintsTest29EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. test29ee@invalidcertificates.gov [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3243: Invalid DN and RFC822 nameConstraints Test29 (2) - PASSED
pkits.sh SUCCESS: Invalid DN and RFC822 nameConstraints Test29 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid DNS nameConstraints Test30
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNSnameConstraintsTest30EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
Chain is good!
pkits.sh: #3244: Valid DNS nameConstraints Test30 - PASSED
pkits.sh SUCCESS: Valid DNS nameConstraints Test30 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid DNS nameConstraints Test31
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNSnameConstraintsTest31EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DNS nameConstraints EE Certificate Test31,O=Test Certificates 2011,C=US [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3245: Invalid DNS nameConstraints Test31 (2) - PASSED
pkits.sh SUCCESS: Invalid DNS nameConstraints Test31 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid DNS nameConstraints Test32
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNSnameConstraintsTest32EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
Chain is good!
pkits.sh: #3246: Valid DNS nameConstraints Test32 - PASSED
pkits.sh SUCCESS: Valid DNS nameConstraints Test32 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid DNS nameConstraints Test33
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNSnameConstraintsTest33EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DNS nameConstraints EE Certificate Test33,O=Test Certificates 2011,C=US [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3247: Invalid DNS nameConstraints Test33 (2) - PASSED
pkits.sh SUCCESS: Invalid DNS nameConstraints Test33 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid URI nameConstraints Test34
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsURI1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidURInameConstraintsTest34EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
Chain is good!
pkits.sh: #3248: Valid URI nameConstraints Test34 - PASSED
pkits.sh SUCCESS: Valid URI nameConstraints Test34 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid URI nameConstraints Test35
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsURI1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidURInameConstraintsTest35EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid URI nameConstraints EE Certificate Test35,O=Test Certificates 2011,C=US [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3249: Invalid URI nameConstraints Test35 (2) - PASSED
pkits.sh SUCCESS: Invalid URI nameConstraints Test35 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Valid URI nameConstraints Test36
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsURI2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidURInameConstraintsTest36EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
Chain is good!
pkits.sh: #3250: Valid URI nameConstraints Test36 - PASSED
pkits.sh SUCCESS: Valid URI nameConstraints Test36 returned as expected 0
Restore DB
--------------------------------------------------------------------
Test case Invalid URI nameConstraints Test37
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsURI2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidURInameConstraintsTest37EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid URI nameConstraints EE Certificate Test37,O=Test Certificates 2011,C=US [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3251: Invalid URI nameConstraints Test37 (2) - PASSED
pkits.sh SUCCESS: Invalid URI nameConstraints Test37 returned as expected 2
Restore DB
--------------------------------------------------------------------
Test case Invalid DNS nameConstraints Test38
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNSnameConstraintsTest38EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DNS nameConstraints EE Certificate Test38,O=Test Certificates 2011,C=US [Certificate Authority]:
ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3252: Invalid DNS nameConstraints Test38 (2) - PASSED
pkits.sh SUCCESS: Invalid DNS nameConstraints Test38 returned as expected 2
Restore DB
***************************************************************
NIST PKITS Section 4.16: Private Certificate Extensions
***************************************************************
--------------------------------------------------------------------
Test case Valid Unknown Not Critical Certificate Extension Test1
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidUnknownNotCriticalCertificateExtensionTest1EE.crt
Chain is good!
pkits.sh: #3253: Valid Unknown Not Critical Certificate Extension Test1 - PASSED
pkits.sh SUCCESS: Valid Unknown Not Critical Certificate Extension Test1 returned as expected 0
--------------------------------------------------------------------
Test case Invalid Unknown Critical Certificate Extension Test2
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidUnknownCriticalCertificateExtensionTest2EE.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Unknown Critical Certificate Extension EE Cert Test2,O=Test Certificates 2011,C=US :
ERROR -8151: Certificate contains unknown critical extension.
pkits.sh: #3254: Invalid Unknown Critical Certificate Extension Test2 (2) - PASSED
pkits.sh SUCCESS: Invalid Unknown Critical Certificate Extension Test2 returned as expected 2
TIMESTAMP pkits END: Tue Nov 27 19:06:55 EST 2012
Running tests for chains
TIMESTAMP chains BEGIN: Tue Nov 27 19:06:55 EST 2012
~/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/aiahttp ~/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/chains
httpserv starting at Tue Nov 27 19:06:55 EST 2012
httpserv -D -p 8553 \
-i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/aiahttp/http_pid.12297 &
trying to connect to httpserv at Tue Nov 27 19:06:55 EST 2012
tstclnt -p 8553 -h buildnss02.usersys.redhat.com -q -v
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to httpserv at Tue Nov 27 19:07:00 EST 2012
tstclnt -p 8553 -h buildnss02.usersys.redhat.com -q -v
tstclnt: error looking up host: A directory lookup on a network address has failed
chains.sh: #3255: Waiting for Server - FAILED
kill -0 29344 >/dev/null 2>/dev/null
httpserv with PID 29344 found at Tue Nov 27 19:07:00 EST 2012
httpserv with PID 29344 started at Tue Nov 27 19:07:00 EST 2012
~/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/chains
chains.sh: Certificate Chains Tests ===============================
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3256: Bridge: Creating DB ArmyDB - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190656 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3257: Bridge: Creating Root CA Army - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3258: Bridge: Exporting Root CA Army.der - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3259: Bridge: Creating DB NavyDB - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190657 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3260: Bridge: Creating Root CA Navy - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3261: Bridge: Exporting Root CA Navy.der - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3262: Bridge: Creating DB BridgeDB - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o BridgeReq.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3263: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127190658 -7 Bridge@Army < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3264: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #3265: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127190659 -7 Bridge@Navy < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3266: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #3267: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #3268: Bridge: Generating PKCS7 package from BridgeDB database - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3269: Bridge: Creating DB UserDB - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o UserReq.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3270: Bridge: Creating EE certifiate request UserReq.der - PASSED
chains.sh: Creating certficate UserBridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1127190660 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3271: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED
chains.sh: Importing certificate UserBridge.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der
chains.sh: #3272: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3273: Bridge: Creating DB AllDB - PASSED
chains.sh: Importing certificate Army.der to AllDB database
certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der
chains.sh: #3274: Bridge: Importing certificate Army.der to AllDB database - PASSED
chains.sh: Importing certificate Navy.der to AllDB database
certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der
chains.sh: #3275: Bridge: Importing certificate Navy.der to AllDB database - PASSED
chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy
vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190657 (0x432f9081)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
Validity:
Not Before: Wed Nov 28 00:07:01 2012
Not After : Tue Nov 28 00:07:01 2062
Subject: "CN=Navy ROOT CA,O=Navy,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:42:b1:e1:be:ce:0d:72:0e:c1:9d:ed:e5:55:b7:02:
20:f2:33:51:cd:94:3a:bc:58:92:69:1a:94:67:b8:a6:
da:13:fe:ec:44:92:4e:af:38:68:43:f8:45:24:03:3e:
1b:e8:a2:df:00:16:4f:0c:d4:b7:9a:97:07:23:cc:70:
5d:30:65:3d:27:86:51:a2:6a:a9:d9:88:bc:2d:6c:e9:
1a:0a:ea:cd:9a:47:28:9b:ef:2a:bb:25:b8:a5:d7:2e:
bd:8d:a9:c8:3a:b6:1d:3d:7f:f7:56:29:03:09:cf:2c:
a9:ce:90:ea:0f:41:a9:87:d1:82:26:b9:f3:2d:67:cf
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
45:17:4c:f1:3f:1a:57:05:fd:07:d1:f2:67:b8:ed:51:
2c:48:0d:3c:d1:23:c8:a5:24:0a:c5:53:3a:e0:12:10:
f4:5b:0f:cd:57:ec:85:03:97:ce:0d:73:20:ed:62:d0:
5e:a2:d2:55:71:7d:51:9d:5d:e4:5e:cd:a8:e6:45:be:
70:87:04:bb:ff:ef:0d:c3:3e:a8:7e:00:01:96:63:c6:
bd:9f:51:0e:c2:08:80:45:e8:27:88:d3:e7:32:9d:c9:
e4:b8:e7:b4:90:17:bc:39:6f:4c:dc:a9:e5:4a:3d:d7:
3b:84:39:4c:42:f7:ba:f2:d7:80:71:3b:08:fb:3c:28
Fingerprint (MD5):
B4:4F:D3:28:A1:10:F8:8C:A1:6C:FC:BB:0C:D1:EE:EB
Fingerprint (SHA1):
88:4A:92:15:24:F3:66:90:51:BB:00:9C:35:A5:D0:87:46:97:F8:BC
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3276: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy - PASSED
chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army
vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190656 (0x432f9080)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Army ROOT CA,O=Army,C=US"
Validity:
Not Before: Wed Nov 28 00:07:01 2012
Not After : Tue Nov 28 00:07:01 2062
Subject: "CN=Army ROOT CA,O=Army,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
f1:4d:72:3f:6d:aa:2a:b7:bb:a7:35:55:af:2f:f6:62:
43:99:c0:3e:93:39:82:c9:6c:2f:ea:1a:bb:20:6b:f5:
44:6e:4a:dd:50:c2:3e:9e:6b:aa:f9:a3:47:45:e8:81:
83:3b:6f:27:45:ec:4b:93:13:cb:74:11:52:ea:0a:54:
e3:dd:70:c9:2e:14:1e:9a:1b:d6:66:d0:20:69:53:4d:
20:0f:3c:82:c9:60:a8:2d:b2:74:6f:9a:93:44:d5:58:
06:48:f4:f2:11:f6:4e:0b:b8:03:ce:dd:27:7f:12:8a:
96:bd:1a:89:05:52:c9:aa:2d:ea:60:8d:04:39:80:cb
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
bb:44:e4:bd:a6:64:cf:05:bc:04:dc:a1:f9:3f:82:cc:
2d:ea:f5:b5:eb:cd:a1:25:bd:ea:92:3f:75:2f:8a:a9:
f0:22:46:dc:25:6c:41:f7:8d:e3:de:d8:b0:45:d6:c3:
d0:57:7e:76:de:81:90:4b:c6:64:f0:b6:00:a7:ac:ca:
3f:7e:7c:7a:44:a3:f0:6a:81:94:6c:d2:e7:81:b6:b7:
a6:73:4c:3c:67:a9:ad:c1:36:4a:7b:a6:ce:80:e0:e1:
e6:05:00:75:53:e4:a5:d4:92:2a:58:94:86:b2:d7:6f:
80:a6:e6:86:2f:44:c2:0f:c0:32:9d:4c:bd:e2:c8:bd
Fingerprint (MD5):
FC:3D:58:EA:E0:3E:78:B0:AA:32:83:BA:5F:7C:7A:99
Fingerprint (SHA1):
2A:94:8E:3A:A7:E0:77:F9:7B:A9:78:C0:22:A8:D7:EE:3D:B3:4C:8F
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3277: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army - PASSED
chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army
vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Navy [Certificate Authority]:
ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3278: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to AllDB database
certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der
chains.sh: #3279: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED
chains.sh: Importing certificate BridgeNavy.der to AllDB database
certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der
chains.sh: #3280: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED
chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army
vfychain -d AllDB -pp -vv UserBridge.der -t Army
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190656 (0x432f9080)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Army ROOT CA,O=Army,C=US"
Validity:
Not Before: Wed Nov 28 00:07:01 2012
Not After : Tue Nov 28 00:07:01 2062
Subject: "CN=Army ROOT CA,O=Army,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
f1:4d:72:3f:6d:aa:2a:b7:bb:a7:35:55:af:2f:f6:62:
43:99:c0:3e:93:39:82:c9:6c:2f:ea:1a:bb:20:6b:f5:
44:6e:4a:dd:50:c2:3e:9e:6b:aa:f9:a3:47:45:e8:81:
83:3b:6f:27:45:ec:4b:93:13:cb:74:11:52:ea:0a:54:
e3:dd:70:c9:2e:14:1e:9a:1b:d6:66:d0:20:69:53:4d:
20:0f:3c:82:c9:60:a8:2d:b2:74:6f:9a:93:44:d5:58:
06:48:f4:f2:11:f6:4e:0b:b8:03:ce:dd:27:7f:12:8a:
96:bd:1a:89:05:52:c9:aa:2d:ea:60:8d:04:39:80:cb
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
bb:44:e4:bd:a6:64:cf:05:bc:04:dc:a1:f9:3f:82:cc:
2d:ea:f5:b5:eb:cd:a1:25:bd:ea:92:3f:75:2f:8a:a9:
f0:22:46:dc:25:6c:41:f7:8d:e3:de:d8:b0:45:d6:c3:
d0:57:7e:76:de:81:90:4b:c6:64:f0:b6:00:a7:ac:ca:
3f:7e:7c:7a:44:a3:f0:6a:81:94:6c:d2:e7:81:b6:b7:
a6:73:4c:3c:67:a9:ad:c1:36:4a:7b:a6:ce:80:e0:e1:
e6:05:00:75:53:e4:a5:d4:92:2a:58:94:86:b2:d7:6f:
80:a6:e6:86:2f:44:c2:0f:c0:32:9d:4c:bd:e2:c8:bd
Fingerprint (MD5):
FC:3D:58:EA:E0:3E:78:B0:AA:32:83:BA:5F:7C:7A:99
Fingerprint (SHA1):
2A:94:8E:3A:A7:E0:77:F9:7B:A9:78:C0:22:A8:D7:EE:3D:B3:4C:8F
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3281: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army - PASSED
chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy
vfychain -d AllDB -pp -vv UserBridge.der -t Navy
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190657 (0x432f9081)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
Validity:
Not Before: Wed Nov 28 00:07:01 2012
Not After : Tue Nov 28 00:07:01 2062
Subject: "CN=Navy ROOT CA,O=Navy,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:42:b1:e1:be:ce:0d:72:0e:c1:9d:ed:e5:55:b7:02:
20:f2:33:51:cd:94:3a:bc:58:92:69:1a:94:67:b8:a6:
da:13:fe:ec:44:92:4e:af:38:68:43:f8:45:24:03:3e:
1b:e8:a2:df:00:16:4f:0c:d4:b7:9a:97:07:23:cc:70:
5d:30:65:3d:27:86:51:a2:6a:a9:d9:88:bc:2d:6c:e9:
1a:0a:ea:cd:9a:47:28:9b:ef:2a:bb:25:b8:a5:d7:2e:
bd:8d:a9:c8:3a:b6:1d:3d:7f:f7:56:29:03:09:cf:2c:
a9:ce:90:ea:0f:41:a9:87:d1:82:26:b9:f3:2d:67:cf
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
45:17:4c:f1:3f:1a:57:05:fd:07:d1:f2:67:b8:ed:51:
2c:48:0d:3c:d1:23:c8:a5:24:0a:c5:53:3a:e0:12:10:
f4:5b:0f:cd:57:ec:85:03:97:ce:0d:73:20:ed:62:d0:
5e:a2:d2:55:71:7d:51:9d:5d:e4:5e:cd:a8:e6:45:be:
70:87:04:bb:ff:ef:0d:c3:3e:a8:7e:00:01:96:63:c6:
bd:9f:51:0e:c2:08:80:45:e8:27:88:d3:e7:32:9d:c9:
e4:b8:e7:b4:90:17:bc:39:6f:4c:dc:a9:e5:4a:3d:d7:
3b:84:39:4c:42:f7:ba:f2:d7:80:71:3b:08:fb:3c:28
Fingerprint (MD5):
B4:4F:D3:28:A1:10:F8:8C:A1:6C:FC:BB:0C:D1:EE:EB
Fingerprint (SHA1):
88:4A:92:15:24:F3:66:90:51:BB:00:9C:35:A5:D0:87:46:97:F8:BC
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3282: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy - PASSED
chains.sh: Creating DB ArmyOnlyDB
certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd
chains.sh: #3283: Bridge: Creating DB ArmyOnlyDB - PASSED
chains.sh: Importing certificate Army.der to ArmyOnlyDB database
certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der
chains.sh: #3284: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED
chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB
vfychain -d ArmyOnlyDB -pp -vv UserBridge.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
ERROR -8179: Peer's Certificate issuer is not recognized.
CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3285: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB - PASSED
chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB
vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
ERROR -8179: Peer's Certificate issuer is not recognized.
CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3286: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB - PASSED
chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB
vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3287: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB - PASSED
chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190657 (0x432f9081)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
Validity:
Not Before: Wed Nov 28 00:07:01 2012
Not After : Tue Nov 28 00:07:01 2062
Subject: "CN=Navy ROOT CA,O=Navy,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:42:b1:e1:be:ce:0d:72:0e:c1:9d:ed:e5:55:b7:02:
20:f2:33:51:cd:94:3a:bc:58:92:69:1a:94:67:b8:a6:
da:13:fe:ec:44:92:4e:af:38:68:43:f8:45:24:03:3e:
1b:e8:a2:df:00:16:4f:0c:d4:b7:9a:97:07:23:cc:70:
5d:30:65:3d:27:86:51:a2:6a:a9:d9:88:bc:2d:6c:e9:
1a:0a:ea:cd:9a:47:28:9b:ef:2a:bb:25:b8:a5:d7:2e:
bd:8d:a9:c8:3a:b6:1d:3d:7f:f7:56:29:03:09:cf:2c:
a9:ce:90:ea:0f:41:a9:87:d1:82:26:b9:f3:2d:67:cf
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
45:17:4c:f1:3f:1a:57:05:fd:07:d1:f2:67:b8:ed:51:
2c:48:0d:3c:d1:23:c8:a5:24:0a:c5:53:3a:e0:12:10:
f4:5b:0f:cd:57:ec:85:03:97:ce:0d:73:20:ed:62:d0:
5e:a2:d2:55:71:7d:51:9d:5d:e4:5e:cd:a8:e6:45:be:
70:87:04:bb:ff:ef:0d:c3:3e:a8:7e:00:01:96:63:c6:
bd:9f:51:0e:c2:08:80:45:e8:27:88:d3:e7:32:9d:c9:
e4:b8:e7:b4:90:17:bc:39:6f:4c:dc:a9:e5:4a:3d:d7:
3b:84:39:4c:42:f7:ba:f2:d7:80:71:3b:08:fb:3c:28
Fingerprint (MD5):
B4:4F:D3:28:A1:10:F8:8C:A1:6C:FC:BB:0C:D1:EE:EB
Fingerprint (SHA1):
88:4A:92:15:24:F3:66:90:51:BB:00:9C:35:A5:D0:87:46:97:F8:BC
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3288: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED
chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190657 (0x432f9081)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
Validity:
Not Before: Wed Nov 28 00:07:01 2012
Not After : Tue Nov 28 00:07:01 2062
Subject: "CN=Navy ROOT CA,O=Navy,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:42:b1:e1:be:ce:0d:72:0e:c1:9d:ed:e5:55:b7:02:
20:f2:33:51:cd:94:3a:bc:58:92:69:1a:94:67:b8:a6:
da:13:fe:ec:44:92:4e:af:38:68:43:f8:45:24:03:3e:
1b:e8:a2:df:00:16:4f:0c:d4:b7:9a:97:07:23:cc:70:
5d:30:65:3d:27:86:51:a2:6a:a9:d9:88:bc:2d:6c:e9:
1a:0a:ea:cd:9a:47:28:9b:ef:2a:bb:25:b8:a5:d7:2e:
bd:8d:a9:c8:3a:b6:1d:3d:7f:f7:56:29:03:09:cf:2c:
a9:ce:90:ea:0f:41:a9:87:d1:82:26:b9:f3:2d:67:cf
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
45:17:4c:f1:3f:1a:57:05:fd:07:d1:f2:67:b8:ed:51:
2c:48:0d:3c:d1:23:c8:a5:24:0a:c5:53:3a:e0:12:10:
f4:5b:0f:cd:57:ec:85:03:97:ce:0d:73:20:ed:62:d0:
5e:a2:d2:55:71:7d:51:9d:5d:e4:5e:cd:a8:e6:45:be:
70:87:04:bb:ff:ef:0d:c3:3e:a8:7e:00:01:96:63:c6:
bd:9f:51:0e:c2:08:80:45:e8:27:88:d3:e7:32:9d:c9:
e4:b8:e7:b4:90:17:bc:39:6f:4c:dc:a9:e5:4a:3d:d7:
3b:84:39:4c:42:f7:ba:f2:d7:80:71:3b:08:fb:3c:28
Fingerprint (MD5):
B4:4F:D3:28:A1:10:F8:8C:A1:6C:FC:BB:0C:D1:EE:EB
Fingerprint (SHA1):
88:4A:92:15:24:F3:66:90:51:BB:00:9C:35:A5:D0:87:46:97:F8:BC
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3289: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED
chains.sh: Creating DB NavyOnlyDB
certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd
chains.sh: #3290: Bridge: Creating DB NavyOnlyDB - PASSED
chains.sh: Importing certificate Navy.der to NavyOnlyDB database
certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der
chains.sh: #3291: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED
chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB
vfychain -d NavyOnlyDB -pp -vv UserBridge.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
ERROR -8179: Peer's Certificate issuer is not recognized.
CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3292: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB - PASSED
chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB
vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
ERROR -8179: Peer's Certificate issuer is not recognized.
CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #3293: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB - PASSED
chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB
vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #3294: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB - PASSED
chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der
vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190656 (0x432f9080)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Army ROOT CA,O=Army,C=US"
Validity:
Not Before: Wed Nov 28 00:07:01 2012
Not After : Tue Nov 28 00:07:01 2062
Subject: "CN=Army ROOT CA,O=Army,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
f1:4d:72:3f:6d:aa:2a:b7:bb:a7:35:55:af:2f:f6:62:
43:99:c0:3e:93:39:82:c9:6c:2f:ea:1a:bb:20:6b:f5:
44:6e:4a:dd:50:c2:3e:9e:6b:aa:f9:a3:47:45:e8:81:
83:3b:6f:27:45:ec:4b:93:13:cb:74:11:52:ea:0a:54:
e3:dd:70:c9:2e:14:1e:9a:1b:d6:66:d0:20:69:53:4d:
20:0f:3c:82:c9:60:a8:2d:b2:74:6f:9a:93:44:d5:58:
06:48:f4:f2:11:f6:4e:0b:b8:03:ce:dd:27:7f:12:8a:
96:bd:1a:89:05:52:c9:aa:2d:ea:60:8d:04:39:80:cb
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
bb:44:e4:bd:a6:64:cf:05:bc:04:dc:a1:f9:3f:82:cc:
2d:ea:f5:b5:eb:cd:a1:25:bd:ea:92:3f:75:2f:8a:a9:
f0:22:46:dc:25:6c:41:f7:8d:e3:de:d8:b0:45:d6:c3:
d0:57:7e:76:de:81:90:4b:c6:64:f0:b6:00:a7:ac:ca:
3f:7e:7c:7a:44:a3:f0:6a:81:94:6c:d2:e7:81:b6:b7:
a6:73:4c:3c:67:a9:ad:c1:36:4a:7b:a6:ce:80:e0:e1:
e6:05:00:75:53:e4:a5:d4:92:2a:58:94:86:b2:d7:6f:
80:a6:e6:86:2f:44:c2:0f:c0:32:9d:4c:bd:e2:c8:bd
Fingerprint (MD5):
FC:3D:58:EA:E0:3E:78:B0:AA:32:83:BA:5F:7C:7A:99
Fingerprint (SHA1):
2A:94:8E:3A:A7:E0:77:F9:7B:A9:78:C0:22:A8:D7:EE:3D:B3:4C:8F
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3295: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der - PASSED
chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der
vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190656 (0x432f9080)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Army ROOT CA,O=Army,C=US"
Validity:
Not Before: Wed Nov 28 00:07:01 2012
Not After : Tue Nov 28 00:07:01 2062
Subject: "CN=Army ROOT CA,O=Army,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
f1:4d:72:3f:6d:aa:2a:b7:bb:a7:35:55:af:2f:f6:62:
43:99:c0:3e:93:39:82:c9:6c:2f:ea:1a:bb:20:6b:f5:
44:6e:4a:dd:50:c2:3e:9e:6b:aa:f9:a3:47:45:e8:81:
83:3b:6f:27:45:ec:4b:93:13:cb:74:11:52:ea:0a:54:
e3:dd:70:c9:2e:14:1e:9a:1b:d6:66:d0:20:69:53:4d:
20:0f:3c:82:c9:60:a8:2d:b2:74:6f:9a:93:44:d5:58:
06:48:f4:f2:11:f6:4e:0b:b8:03:ce:dd:27:7f:12:8a:
96:bd:1a:89:05:52:c9:aa:2d:ea:60:8d:04:39:80:cb
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
bb:44:e4:bd:a6:64:cf:05:bc:04:dc:a1:f9:3f:82:cc:
2d:ea:f5:b5:eb:cd:a1:25:bd:ea:92:3f:75:2f:8a:a9:
f0:22:46:dc:25:6c:41:f7:8d:e3:de:d8:b0:45:d6:c3:
d0:57:7e:76:de:81:90:4b:c6:64:f0:b6:00:a7:ac:ca:
3f:7e:7c:7a:44:a3:f0:6a:81:94:6c:d2:e7:81:b6:b7:
a6:73:4c:3c:67:a9:ad:c1:36:4a:7b:a6:ce:80:e0:e1:
e6:05:00:75:53:e4:a5:d4:92:2a:58:94:86:b2:d7:6f:
80:a6:e6:86:2f:44:c2:0f:c0:32:9d:4c:bd:e2:c8:bd
Fingerprint (MD5):
FC:3D:58:EA:E0:3E:78:B0:AA:32:83:BA:5F:7C:7A:99
Fingerprint (SHA1):
2A:94:8E:3A:A7:E0:77:F9:7B:A9:78:C0:22:A8:D7:EE:3D:B3:4C:8F
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3296: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der - PASSED
chains.sh: Creating DB Root1DB
certutil -N -d Root1DB -f Root1DB/dbpasswd
chains.sh: #3297: MegaBridge_3_2: Creating DB Root1DB - PASSED
chains.sh: Creating Root CA Root1
certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190661 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3298: MegaBridge_3_2: Creating Root CA Root1 - PASSED
chains.sh: Exporting Root CA Root1.der
certutil -L -d Root1DB -r -n Root1 -o Root1.der
chains.sh: #3299: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED
chains.sh: Creating DB Root2DB
certutil -N -d Root2DB -f Root2DB/dbpasswd
chains.sh: #3300: MegaBridge_3_2: Creating DB Root2DB - PASSED
chains.sh: Creating Root CA Root2
certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190662 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3301: MegaBridge_3_2: Creating Root CA Root2 - PASSED
chains.sh: Exporting Root CA Root2.der
certutil -L -d Root2DB -r -n Root2 -o Root2.der
chains.sh: #3302: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED
chains.sh: Creating DB Root3DB
certutil -N -d Root3DB -f Root3DB/dbpasswd
chains.sh: #3303: MegaBridge_3_2: Creating DB Root3DB - PASSED
chains.sh: Creating Root CA Root3
certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190663 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3304: MegaBridge_3_2: Creating Root CA Root3 - PASSED
chains.sh: Exporting Root CA Root3.der
certutil -L -d Root3DB -r -n Root3 -o Root3.der
chains.sh: #3305: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED
chains.sh: Creating DB Root4DB
certutil -N -d Root4DB -f Root4DB/dbpasswd
chains.sh: #3306: MegaBridge_3_2: Creating DB Root4DB - PASSED
chains.sh: Creating Root CA Root4
certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190664 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3307: MegaBridge_3_2: Creating Root CA Root4 - PASSED
chains.sh: Exporting Root CA Root4.der
certutil -L -d Root4DB -r -n Root4 -o Root4.der
chains.sh: #3308: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED
chains.sh: Creating DB Root5DB
certutil -N -d Root5DB -f Root5DB/dbpasswd
chains.sh: #3309: MegaBridge_3_2: Creating DB Root5DB - PASSED
chains.sh: Creating Root CA Root5
certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190665 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3310: MegaBridge_3_2: Creating Root CA Root5 - PASSED
chains.sh: Exporting Root CA Root5.der
certutil -L -d Root5DB -r -n Root5 -o Root5.der
chains.sh: #3311: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED
chains.sh: Creating DB Root6DB
certutil -N -d Root6DB -f Root6DB/dbpasswd
chains.sh: #3312: MegaBridge_3_2: Creating DB Root6DB - PASSED
chains.sh: Creating Root CA Root6
certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190666 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3313: MegaBridge_3_2: Creating Root CA Root6 - PASSED
chains.sh: Exporting Root CA Root6.der
certutil -L -d Root6DB -r -n Root6 -o Root6.der
chains.sh: #3314: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED
chains.sh: Creating DB Root7DB
certutil -N -d Root7DB -f Root7DB/dbpasswd
chains.sh: #3315: MegaBridge_3_2: Creating DB Root7DB - PASSED
chains.sh: Creating Root CA Root7
certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190667 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3316: MegaBridge_3_2: Creating Root CA Root7 - PASSED
chains.sh: Exporting Root CA Root7.der
certutil -L -d Root7DB -r -n Root7 -o Root7.der
chains.sh: #3317: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED
chains.sh: Creating DB Root8DB
certutil -N -d Root8DB -f Root8DB/dbpasswd
chains.sh: #3318: MegaBridge_3_2: Creating DB Root8DB - PASSED
chains.sh: Creating Root CA Root8
certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190668 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3319: MegaBridge_3_2: Creating Root CA Root8 - PASSED
chains.sh: Exporting Root CA Root8.der
certutil -L -d Root8DB -r -n Root8 -o Root8.der
chains.sh: #3320: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED
chains.sh: Creating DB Root9DB
certutil -N -d Root9DB -f Root9DB/dbpasswd
chains.sh: #3321: MegaBridge_3_2: Creating DB Root9DB - PASSED
chains.sh: Creating Root CA Root9
certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190669 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3322: MegaBridge_3_2: Creating Root CA Root9 - PASSED
chains.sh: Exporting Root CA Root9.der
certutil -L -d Root9DB -r -n Root9 -o Root9.der
chains.sh: #3323: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED
chains.sh: Creating DB Bridge11DB
certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd
chains.sh: #3324: MegaBridge_3_2: Creating DB Bridge11DB - PASSED
chains.sh: Creating Bridge certifiate request Bridge11Req.der
certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o Bridge11Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3325: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED
chains.sh: Creating certficate Bridge11Root1.der signed by Root1
certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1127190670 -7 Bridge11@Root1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3326: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED
chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der
chains.sh: #3327: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED
chains.sh: Creating certficate Bridge11Root2.der signed by Root2
certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1127190671 -7 Bridge11@Root2 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3328: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED
chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der
chains.sh: #3329: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED
chains.sh: Creating certficate Bridge11Root3.der signed by Root3
certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1127190672 -7 Bridge11@Root3 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3330: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED
chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der
chains.sh: #3331: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED
chains.sh: Generating PKCS7 package from Bridge11DB database
cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7
chains.sh: #3332: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED
chains.sh: Creating DB Bridge12DB
certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd
chains.sh: #3333: MegaBridge_3_2: Creating DB Bridge12DB - PASSED
chains.sh: Creating Bridge certifiate request Bridge12Req.der
certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o Bridge12Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3334: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED
chains.sh: Creating certficate Bridge12Root4.der signed by Root4
certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1127190673 -7 Bridge12@Root4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3335: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED
chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der
chains.sh: #3336: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED
chains.sh: Creating certficate Bridge12Root5.der signed by Root5
certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1127190674 -7 Bridge12@Root5 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3337: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED
chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der
chains.sh: #3338: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED
chains.sh: Creating certficate Bridge12Root6.der signed by Root6
certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1127190675 -7 Bridge12@Root6 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3339: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED
chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der
chains.sh: #3340: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED
chains.sh: Generating PKCS7 package from Bridge12DB database
cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7
chains.sh: #3341: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED
chains.sh: Creating DB Bridge13DB
certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd
chains.sh: #3342: MegaBridge_3_2: Creating DB Bridge13DB - PASSED
chains.sh: Creating Bridge certifiate request Bridge13Req.der
certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o Bridge13Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3343: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED
chains.sh: Creating certficate Bridge13Root7.der signed by Root7
certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1127190676 -7 Bridge13@Root7 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3344: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED
chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der
chains.sh: #3345: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED
chains.sh: Creating certficate Bridge13Root8.der signed by Root8
certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1127190677 -7 Bridge13@Root8 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3346: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED
chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der
chains.sh: #3347: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED
chains.sh: Creating certficate Bridge13Root9.der signed by Root9
certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1127190678 -7 Bridge13@Root9 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3348: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED
chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der
chains.sh: #3349: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED
chains.sh: Generating PKCS7 package from Bridge13DB database
cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7
chains.sh: #3350: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED
chains.sh: Creating DB Bridge21DB
certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd
chains.sh: #3351: MegaBridge_3_2: Creating DB Bridge21DB - PASSED
chains.sh: Creating Bridge certifiate request Bridge21Req.der
certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o Bridge21Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3352: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED
chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11
certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1127190679 -7 Bridge21@Bridge11 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3353: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED
chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der
chains.sh: #3354: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED
chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12
certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1127190680 -7 Bridge21@Bridge12 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3355: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED
chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der
chains.sh: #3356: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED
chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13
certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1127190681 -7 Bridge21@Bridge13 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3357: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED
chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der
chains.sh: #3358: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED
chains.sh: Generating PKCS7 package from Bridge21DB database
cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7
chains.sh: #3359: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3360: MegaBridge_3_2: Creating DB CA1DB - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3361: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED
chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21
certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1127190682 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3362: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED
chains.sh: Importing certificate CA1Bridge21.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der
chains.sh: #3363: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3364: MegaBridge_3_2: Creating DB EE1DB - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3365: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127190683 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3366: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3367: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der
vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190661 (0x432f9085)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root1 ROOT CA,O=Root1,C=US"
Validity:
Not Before: Wed Nov 28 00:07:03 2012
Not After : Tue Nov 28 00:07:03 2062
Subject: "CN=Root1 ROOT CA,O=Root1,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
cf:09:d1:57:3d:13:90:fe:b8:29:a9:a4:3f:1a:5c:cc:
ad:55:ce:a8:48:c2:b6:58:d4:8c:c1:ea:4a:11:fb:97:
85:93:b5:0e:ea:f0:52:18:60:9c:87:96:be:19:d6:21:
1f:92:b9:44:9b:84:0b:bf:72:ad:d4:42:14:6f:f1:80:
2f:c7:f0:b2:26:ee:c6:1c:53:25:ee:dc:79:0f:c0:74:
a1:85:ca:9c:1c:54:c7:0e:db:43:11:63:c1:0a:d0:f4:
30:4a:2e:cd:ab:a5:4b:65:2e:cf:18:e1:e6:f5:f1:da:
30:e3:c8:20:9d:03:9c:e3:7f:de:37:a9:ef:ed:d2:33
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
3c:9f:8e:11:cb:43:3a:5b:1a:e1:54:02:82:5f:71:04:
0c:ea:0a:3b:ea:b4:46:e1:15:47:57:d2:13:78:a1:7f:
39:c9:e6:1f:ce:e9:ad:f7:63:b8:a6:03:11:4b:32:26:
0c:de:18:6d:2f:5a:43:ed:0f:b4:d7:1f:3e:dd:e5:5f:
22:03:29:a4:be:47:f6:db:5f:71:43:af:8f:08:de:09:
44:49:75:a3:7b:a5:62:56:16:0f:3f:b7:e7:ac:72:81:
a9:e5:cc:15:df:30:37:fd:a0:17:61:a5:dd:51:a4:98:
1a:f1:7c:a8:31:3e:dc:70:ca:f5:4a:76:d4:67:30:83
Fingerprint (MD5):
3F:CD:56:FC:E6:D8:F5:79:B3:54:68:2F:26:E5:A6:5D
Fingerprint (SHA1):
46:C8:23:40:F4:13:B9:DD:BD:A3:9F:73:CF:84:B5:D7:75:49:06:E0
Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3368: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der
vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190662 (0x432f9086)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root2 ROOT CA,O=Root2,C=US"
Validity:
Not Before: Wed Nov 28 00:07:03 2012
Not After : Tue Nov 28 00:07:03 2062
Subject: "CN=Root2 ROOT CA,O=Root2,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
bb:a8:8e:dd:13:bc:aa:09:57:e5:44:52:c2:1f:60:1c:
d7:9f:c9:bf:d9:36:a1:86:37:e9:95:a0:aa:39:33:1c:
ba:ac:dc:6c:d0:73:32:e6:7c:16:e6:08:de:d1:58:eb:
b1:57:89:9d:23:72:94:7f:67:e9:0f:b3:27:3d:bb:47:
41:21:39:35:11:67:77:b2:52:32:5b:9e:a3:65:3c:c1:
c5:f3:86:69:72:2f:8c:36:47:87:74:a6:2d:8a:a7:fc:
d0:0a:12:71:15:b8:ed:c6:8f:37:df:89:11:1e:0e:4b:
a7:f7:fa:49:3a:0d:ec:ad:61:8b:ec:27:e5:29:86:55
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
17:36:9e:f9:66:83:22:02:36:5e:d5:ac:5b:b2:4a:95:
3e:a4:3f:1f:bb:29:04:99:5e:ca:03:c1:ac:42:62:2a:
5d:35:4f:e7:c6:5c:11:ea:14:1f:f3:6b:0e:5e:e6:e4:
06:84:5b:ef:e6:7c:05:48:4a:fa:6a:c5:7c:d0:13:86:
39:48:5c:56:dd:74:1d:73:13:d7:a2:99:4c:d1:6b:5a:
1b:3c:71:de:24:40:08:a2:92:ab:53:2a:14:75:2d:63:
60:ea:63:33:d1:60:ba:82:8f:f3:a5:19:7c:de:f7:4d:
10:13:98:26:a5:3a:4e:95:24:90:9a:66:09:01:86:8a
Fingerprint (MD5):
1C:CD:A6:C6:84:E2:73:7A:BD:49:5E:9E:D1:BB:EA:F9
Fingerprint (SHA1):
CF:65:07:DC:B3:CC:A9:34:91:0B:83:BE:D6:BB:C8:E2:A1:A3:4E:20
Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3369: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der
vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190663 (0x432f9087)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root3 ROOT CA,O=Root3,C=US"
Validity:
Not Before: Wed Nov 28 00:07:03 2012
Not After : Tue Nov 28 00:07:03 2062
Subject: "CN=Root3 ROOT CA,O=Root3,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:1b:bb:d5:b5:08:d7:8c:ed:08:5b:65:43:60:9d:49:
6b:51:24:63:07:53:d5:53:d5:af:85:a8:50:1d:ef:84:
c4:07:b9:f9:f3:2b:1a:ba:3e:0e:b7:19:d9:d5:f6:db:
01:d1:ee:60:59:2c:af:16:2a:6f:1b:64:54:b6:08:18:
f9:c8:bd:ac:fb:0d:b6:72:b5:75:83:f5:30:68:0d:de:
82:f0:93:77:63:f4:df:b4:56:19:3a:a5:38:b3:b2:c6:
24:25:f7:83:cf:53:31:7c:7f:3d:87:b1:32:1d:f0:68:
00:80:3a:ca:1d:87:14:d5:2a:3a:66:c7:ba:97:e4:09
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
a5:f4:34:2b:05:cb:ec:03:96:04:75:e5:1e:e7:19:97:
2e:58:8c:36:7e:3e:4c:51:68:b3:43:e9:33:f9:7c:af:
e5:62:e9:6c:50:a1:99:97:71:15:a9:3b:04:2e:f5:83:
31:16:85:16:7f:c3:18:6d:2e:7d:fc:8c:4b:7d:5a:c2:
91:06:bd:0a:ce:9d:eb:15:5a:60:33:34:7a:2f:cc:8d:
98:22:f4:14:0b:29:1c:c0:9f:bf:ec:2f:f7:a0:36:be:
95:8f:73:e9:ad:54:f2:db:4b:70:0c:80:41:46:63:8c:
7a:e3:fc:ef:50:0f:e3:fa:e8:67:02:1e:7a:ab:20:f8
Fingerprint (MD5):
5A:1D:38:A4:0B:34:56:8F:CF:43:91:37:77:AB:E3:34
Fingerprint (SHA1):
A2:4D:4A:F3:0E:39:CB:98:04:AE:FA:7C:C2:4D:E2:F4:F5:B2:71:27
Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3370: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der
vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190664 (0x432f9088)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root4 ROOT CA,O=Root4,C=US"
Validity:
Not Before: Wed Nov 28 00:07:04 2012
Not After : Tue Nov 28 00:07:04 2062
Subject: "CN=Root4 ROOT CA,O=Root4,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b1:3d:00:d4:f4:13:4c:5e:08:18:73:07:4c:c2:29:a1:
03:e5:42:1f:e6:e7:37:4d:e1:ed:78:b7:58:ac:95:fb:
22:b7:83:23:e9:db:51:af:21:18:4a:c9:86:84:45:f0:
c8:3f:4d:b9:4c:59:04:6e:1b:1c:29:47:fe:fc:de:2e:
4e:a2:7b:23:04:5b:2e:02:05:a2:5c:06:eb:df:eb:a1:
18:23:ce:2b:2e:29:79:db:ac:70:82:63:52:f3:5a:50:
ec:b6:2c:77:96:4f:61:56:80:14:e5:5c:e8:ec:7d:a0:
14:29:a6:20:73:46:02:6d:b6:d0:64:ba:68:36:0c:33
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
97:96:5f:46:ac:3d:e7:3d:c0:8f:86:c4:a3:5a:2c:f8:
52:4a:2a:49:ff:ce:d8:b9:46:ba:aa:93:0a:48:f2:36:
41:b9:4a:1d:b6:2c:50:d5:2f:9f:29:90:b8:a1:2c:44:
b7:39:91:f6:e1:63:f2:65:fa:b3:11:b9:b5:75:14:5c:
fd:fd:72:f5:23:56:87:e5:b6:2f:ee:55:6e:98:3e:30:
cb:95:74:48:11:53:fe:0e:b1:91:64:40:d7:3e:11:10:
2d:0b:23:42:f5:ab:2d:af:f6:c3:34:24:d2:5c:16:19:
72:f8:dd:80:26:ee:ae:a6:a4:9e:10:1a:d1:82:fc:ad
Fingerprint (MD5):
9B:AC:58:A1:B7:A9:40:54:CC:E1:87:B8:72:C2:35:3D
Fingerprint (SHA1):
3C:8A:C9:CC:D6:C5:27:8A:F9:A7:36:06:21:77:2B:2E:75:09:F3:D0
Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3371: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der
vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190665 (0x432f9089)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root5 ROOT CA,O=Root5,C=US"
Validity:
Not Before: Wed Nov 28 00:07:04 2012
Not After : Tue Nov 28 00:07:04 2062
Subject: "CN=Root5 ROOT CA,O=Root5,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
cd:c9:6c:6b:b2:9b:e7:4a:6d:69:1a:e9:b6:e6:25:33:
39:20:53:fe:c1:d2:96:ea:35:e9:7d:0d:91:9c:df:2f:
4c:97:be:a2:c2:e5:06:0d:50:54:72:a7:ea:93:cf:e3:
8d:c3:c0:e5:86:47:4a:05:a6:b9:04:05:70:a6:c2:47:
aa:3d:4a:3b:60:80:8e:c2:53:bd:4c:17:f0:5f:06:9a:
c4:e6:f5:1b:ae:b6:6b:10:5c:e7:dc:69:90:36:07:f0:
58:d2:97:e8:47:1c:aa:25:c5:3f:d0:e4:74:c4:8d:3e:
8e:ee:9e:29:d1:a2:28:5a:37:ed:5f:3f:8c:4f:3c:13
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
33:70:09:c1:d1:13:06:d0:88:e9:e8:56:77:71:74:fa:
05:a9:75:c0:b1:f3:62:c9:b9:5a:15:79:49:f0:b9:e0:
ae:0a:ec:93:8d:ff:98:33:5b:f9:f0:df:e6:39:19:cd:
82:d8:5b:63:54:32:60:06:62:9e:95:b8:13:9e:8e:8c:
ed:44:d3:04:fa:58:f3:b3:7f:8d:d3:0d:ce:92:e5:01:
2b:ba:2b:2d:b4:c5:30:61:50:6c:f1:e9:36:c8:a4:17:
7c:0c:cf:6f:f8:25:c1:a3:06:4b:e8:56:88:2e:09:e3:
82:a9:ac:53:d9:0b:a9:72:63:80:46:84:79:1b:08:c6
Fingerprint (MD5):
EC:81:86:53:0A:38:0A:01:96:B0:DC:3B:6E:CD:CC:08
Fingerprint (SHA1):
3C:79:D6:21:D1:F7:BA:59:FD:33:18:88:59:DB:18:38:FC:AC:B9:34
Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3372: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der
vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190666 (0x432f908a)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root6 ROOT CA,O=Root6,C=US"
Validity:
Not Before: Wed Nov 28 00:07:04 2012
Not After : Tue Nov 28 00:07:04 2062
Subject: "CN=Root6 ROOT CA,O=Root6,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
be:a2:93:22:82:9b:2e:d8:4d:b6:9b:b1:8b:2c:25:b6:
5a:fa:80:41:7b:0d:e2:40:d7:de:bf:46:6f:63:50:15:
50:89:b7:6f:af:85:6b:0d:82:08:93:98:c9:ed:01:c8:
c3:c1:15:65:8a:b7:83:ab:f2:d9:b2:48:5f:3b:9d:af:
12:ba:1b:8a:84:ca:6e:c1:f2:a5:f1:6a:ed:d5:90:80:
79:71:bd:51:17:46:90:56:74:9b:dd:8f:0e:7b:61:c6:
57:33:04:d0:63:df:01:21:2c:b6:c9:40:ed:53:87:ef:
da:e3:f9:a6:cc:c5:e9:a0:3f:64:c7:7c:e1:21:ef:f3
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
8f:31:1a:6f:72:33:82:77:d9:c1:46:a0:d4:57:23:4d:
38:94:54:de:e0:84:de:86:41:37:64:03:50:79:77:3d:
0c:3e:72:67:b6:3c:ba:ec:86:ab:d6:23:d4:77:c5:7f:
e2:9a:50:d1:79:2d:8e:5c:67:86:49:ac:3a:01:24:6d:
5c:7c:80:fe:81:68:f7:75:a7:2f:4a:85:fb:92:b9:da:
4e:5a:1d:75:47:ca:83:a8:04:5f:f5:f1:2e:e1:d4:b9:
82:d6:5f:82:39:02:e9:e5:e9:59:ee:53:83:f0:18:0e:
88:73:b4:3d:fa:e2:b7:c8:0e:33:27:8e:d3:cc:00:7d
Fingerprint (MD5):
5A:57:0D:5B:19:38:8E:DC:E5:98:8F:5C:63:E6:5D:C7
Fingerprint (SHA1):
9C:59:FF:B5:5D:EB:10:C4:E4:40:BE:5A:6F:69:97:84:28:FB:80:90
Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3373: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der
vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190667 (0x432f908b)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root7 ROOT CA,O=Root7,C=US"
Validity:
Not Before: Wed Nov 28 00:07:04 2012
Not After : Tue Nov 28 00:07:04 2062
Subject: "CN=Root7 ROOT CA,O=Root7,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
c4:c3:40:dd:34:33:1f:cf:d6:0b:ad:3a:33:61:26:e9:
01:65:b4:17:c9:18:34:dd:da:4d:41:9a:d5:d2:9f:2c:
7f:09:dc:a2:0e:25:5a:c5:89:38:01:40:d0:73:15:9e:
e5:f4:63:ff:e2:a4:fc:98:fa:a2:c0:d6:fe:9a:03:4a:
15:b5:9f:84:3f:9a:34:c9:c9:28:8b:33:44:5f:29:13:
91:8f:56:01:ea:06:6d:c9:0b:22:cd:e3:ac:76:ca:f2:
9d:72:d8:26:33:7d:e6:57:02:b2:b4:ff:69:a8:f3:6c:
a0:39:ef:44:56:04:95:c7:f3:06:15:4c:6b:b3:93:2d
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
b4:a2:af:60:d6:41:75:30:32:83:0d:6d:0c:11:9a:81:
73:ae:bd:70:fc:19:ec:57:1e:bc:64:ce:9b:7b:f0:a3:
ac:7d:6d:2d:8a:a6:c8:b9:f0:7a:82:6c:0c:0d:a6:fb:
1c:d2:a7:94:b7:f4:f1:90:63:87:4d:57:be:f0:d4:f9:
56:91:56:46:09:f0:4d:0c:75:c2:4b:6a:40:a6:46:f5:
b4:8f:95:37:31:ae:f4:35:24:57:cf:ae:78:54:0c:71:
1c:df:25:c6:06:e8:06:a9:05:27:52:02:75:d5:9e:2d:
7e:64:c5:60:4e:5a:e8:13:ea:b7:37:4c:73:eb:0c:a3
Fingerprint (MD5):
B1:5B:FF:65:3F:F1:A8:A4:7D:14:D8:45:2E:93:05:CB
Fingerprint (SHA1):
2A:28:21:2A:AB:38:3F:14:92:A5:B9:F9:01:9B:1A:3F:38:EF:3C:86
Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3374: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der
vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190668 (0x432f908c)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root8 ROOT CA,O=Root8,C=US"
Validity:
Not Before: Wed Nov 28 00:07:05 2012
Not After : Tue Nov 28 00:07:05 2062
Subject: "CN=Root8 ROOT CA,O=Root8,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:d4:55:2a:53:94:5c:be:d6:22:70:e0:0a:26:df:a0:
1f:33:e6:37:b3:59:7a:53:f0:28:31:46:c9:80:4a:e2:
76:fe:92:61:78:a4:e6:44:15:ba:66:49:c9:93:99:05:
20:5b:35:ee:2a:92:b9:5e:24:b0:e3:d1:cf:ce:6b:5c:
9f:ab:48:3d:75:70:65:88:c1:8d:b4:83:01:ed:e1:72:
e3:6e:cc:4e:b8:30:37:e7:38:8a:97:5d:66:33:22:77:
b3:98:64:b1:cc:40:06:b0:17:30:b9:15:86:ef:ed:ba:
10:4d:42:d4:52:62:d8:de:e2:88:59:b3:05:c0:3f:b5
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
a5:92:8e:d0:ca:e3:22:f1:36:94:16:63:44:16:3d:95:
b3:d9:53:9c:bd:89:87:3b:54:aa:93:f6:ee:65:de:4b:
d0:ee:83:99:f7:3d:68:2f:40:72:de:37:ec:7b:ab:bd:
b0:a9:c4:04:29:3f:8a:3c:2b:35:bc:5b:d2:c4:20:6e:
d1:27:6b:db:a7:33:5f:15:51:80:d8:14:d5:0d:e2:eb:
e7:5e:38:22:c9:a9:7c:5c:99:09:6a:f3:1c:f6:00:8b:
21:c1:52:2b:98:a5:8a:7b:fa:17:0f:7e:cc:d9:29:68:
d1:61:d8:4b:a8:b2:d2:ab:ad:c5:da:bb:6f:67:4a:02
Fingerprint (MD5):
46:B8:B7:11:81:17:EE:32:3C:74:F3:C9:EC:B5:FB:CF
Fingerprint (SHA1):
0B:64:B5:EE:EF:1A:22:61:A4:96:C4:10:85:82:72:4B:9A:50:91:9E
Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3375: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der
vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190669 (0x432f908d)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root9 ROOT CA,O=Root9,C=US"
Validity:
Not Before: Wed Nov 28 00:07:05 2012
Not After : Tue Nov 28 00:07:05 2062
Subject: "CN=Root9 ROOT CA,O=Root9,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
f0:ae:c4:08:55:7c:eb:ad:21:8e:9b:71:5d:fd:aa:ed:
ff:fe:e3:6b:36:38:3e:58:39:ef:c7:4f:1e:6a:ea:9b:
09:c9:f9:6b:1d:b5:c0:c6:d4:f0:da:4f:99:37:d0:25:
e9:fe:da:9c:b8:b7:07:34:3d:1b:81:d9:68:f9:db:f7:
55:f1:f8:ba:12:da:1e:51:5c:8c:10:49:da:00:0e:ca:
a1:6a:a6:62:0d:2e:77:af:a4:c6:9a:2a:e0:14:93:15:
5e:07:4b:43:35:d8:56:66:cf:6c:e4:d7:a9:b2:48:c7:
89:7d:28:d1:12:8c:f8:4a:31:02:ae:12:30:9b:f4:d9
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
63:7f:42:46:63:a8:5c:f8:9a:c3:d5:2a:a9:5d:3a:fa:
4d:18:b7:d6:1b:4c:9f:50:8c:5d:d7:27:fe:11:9c:ff:
02:5f:03:e8:0a:07:37:63:a0:8d:7b:eb:a8:28:b1:1a:
88:82:4c:19:e7:11:52:7c:92:7c:6e:f0:79:68:c7:3d:
4e:1e:67:31:86:97:18:6d:cc:d6:cc:e5:f1:fe:e4:f2:
24:60:95:49:e0:7a:31:e8:ba:03:14:b3:f9:31:d6:db:
8e:2b:b4:31:4c:2f:a7:a1:4d:08:6a:51:52:db:85:db:
68:d8:59:cf:c3:57:4e:31:8a:fd:61:7a:38:05:5a:dc
Fingerprint (MD5):
4E:1F:11:4B:5B:CD:5F:96:0D:AA:92:83:23:C1:FE:E6
Fingerprint (SHA1):
1E:78:CD:90:6E:CC:D1:88:01:AC:F1:3D:B0:98:43:4F:28:9A:91:E1
Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3376: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3377: Extension: Creating DB RootDB - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190684 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3378: Extension: Creating Root CA Root - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3379: Extension: Exporting Root CA Root.der - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3380: Extension: Creating DB CA1DB - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3381: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127190685 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3382: Extension: Creating certficate CA1Root.der signed by Root - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3383: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3384: Extension: Creating DB CA2DB - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3385: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127190686 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3386: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3387: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3388: Extension: Creating DB UserDB - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o UserReq.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3389: Extension: Creating EE certifiate request UserReq.der - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127190687 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3390: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #3391: Extension: Importing certificate UserCA2.der to UserDB database - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3392: Extension: Creating DB AllDB - PASSED
chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der
vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190684 (0x432f909c)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:08 2012
Not After : Tue Nov 28 00:07:08 2062
Subject: "CN=Root ROOT CA,O=Root,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
bb:9f:87:ae:4c:2d:da:75:0c:c0:65:d2:c1:61:8c:84:
81:23:70:2e:93:d5:90:fb:98:40:a5:b9:50:31:f0:95:
38:30:66:e6:18:6d:87:65:f3:fe:7f:22:9f:24:b8:2b:
42:4d:fd:cd:bf:98:73:d7:b5:7f:8c:08:b6:6a:c3:49:
43:38:36:e8:ba:05:57:13:2b:04:b5:dd:f8:11:a0:fc:
bc:02:9d:c0:ae:9c:57:7b:9a:04:25:a8:a8:1d:9b:83:
46:ba:48:2c:12:11:b1:1e:93:3f:e6:fc:59:9f:a7:2d:
73:68:fd:e5:6c:cb:9e:d6:d1:a2:55:54:92:74:44:13
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
16:10:55:6f:89:b6:6f:ea:18:9d:6a:6a:cc:14:aa:dd:
2b:2a:e3:12:f1:42:72:a7:cb:a2:91:fd:d0:5c:43:d8:
bd:e1:b6:92:91:eb:3e:a6:c2:95:1f:55:98:d2:0d:96:
58:aa:5e:f1:c1:bd:ec:b7:99:8c:58:f5:e3:50:6f:8e:
89:59:f5:f9:d7:14:d2:0c:48:e5:80:1b:1f:95:31:6f:
b7:90:85:59:b9:ee:e6:a0:83:dc:7d:83:a2:53:fb:ce:
ae:94:67:7c:1d:a8:cb:0b:ad:b3:48:d8:15:80:78:c9:
4a:6f:5a:a4:2b:53:32:58:9d:b8:2a:86:e1:a5:25:be
Fingerprint (MD5):
69:56:3B:5D:22:52:A3:24:B5:BC:F1:E2:E6:FD:0E:EC
Fingerprint (SHA1):
90:03:C4:7B:72:23:C2:D1:2C:56:0F:4A:D0:74:0B:03:41:06:D1:20
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3393: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED
chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der
vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3394: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED
chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der
vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190685 (0x432f909d)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:09 2012
Not After : Tue Nov 28 00:07:09 2017
Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
c2:9b:50:80:d3:40:26:39:78:6d:b9:12:58:ba:f7:bd:
98:81:da:71:14:40:73:8f:e1:dc:d2:15:d0:92:4d:ca:
b2:c3:de:21:3b:6b:63:a2:f6:0b:95:d9:52:af:f4:9a:
fc:44:9c:78:7d:a2:90:df:a3:fe:26:3e:e7:7b:ed:1a:
0f:b9:fa:fe:be:f0:d5:e3:60:f8:27:75:2e:27:11:e9:
97:4c:92:5a:ef:1c:bf:8d:57:93:b2:23:b4:f2:b7:a0:
d8:27:b7:1c:1a:71:af:bd:c3:37:6a:e3:bd:69:75:65:
f4:ee:9f:13:5b:4a:6a:ac:31:d4:ce:05:89:95:db:fb
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: Certificate Policies
Data:
Policy Name: User Defined Policy OID
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
15:e6:65:8e:0c:b5:ae:ae:e6:d0:db:4c:9b:98:41:a5:
5f:a4:c3:2b:98:27:eb:8e:44:8e:09:4f:38:42:55:8c:
f3:4a:23:52:29:04:54:3c:ae:a8:2e:86:66:f6:cf:1d:
16:94:87:ed:2c:79:d5:88:a8:d6:52:8d:4d:39:eb:37:
17:ad:fb:3a:e2:45:1b:b4:09:00:43:2d:3e:d0:a6:dc:
82:5d:25:95:0b:0d:c2:e6:58:66:ea:d1:f3:4c:b0:99:
8b:87:1a:b1:b3:65:eb:0a:dd:e8:a5:7e:38:77:86:db:
54:d8:c8:d4:29:b9:88:c8:ee:a1:99:ea:73:e3:27:e7
Fingerprint (MD5):
15:4E:D0:FC:BA:AB:FA:21:34:0B:E1:58:DF:60:54:97
Fingerprint (SHA1):
BD:CE:B0:9B:39:A9:13:FE:73:2F:A3:BD:90:78:A3:1E:17:11:8A:D5
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3395: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der
vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3396: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der
vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190686 (0x432f909e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
Validity:
Not Before: Wed Nov 28 00:07:09 2012
Not After : Tue Nov 28 00:07:09 2017
Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
fa:aa:4f:96:6e:c5:61:0d:fd:ab:4f:c2:3c:01:58:14:
43:5d:9e:40:26:0f:99:ff:2d:bd:c6:43:87:5b:4a:73:
96:10:12:b1:29:91:55:3b:cd:ec:06:eb:01:1b:ba:46:
4f:16:c7:a7:1b:10:eb:95:09:1f:0c:9e:3d:16:fc:52:
e2:13:a3:be:c5:ca:65:49:6c:8f:ff:e8:16:e9:e4:43:
7e:3d:74:77:fb:7a:4a:b1:df:3d:42:04:72:5c:d2:78:
47:b3:4a:13:ff:de:b6:bc:f8:f3:e9:c1:b1:24:c9:1a:
be:5e:27:90:ed:49:a1:25:04:5b:74:3d:48:8e:00:cb
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: Certificate Policies
Data:
Policy Name: User Defined Policy OID
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
19:c2:82:43:f7:ae:69:a6:60:73:05:80:59:a0:cd:83:
86:8d:02:d4:6d:9b:33:60:0c:3d:18:32:5c:b2:cc:22:
bf:83:8d:fa:28:4c:7b:c6:05:6c:47:e3:3a:50:25:2b:
c3:35:a7:9b:9e:a4:0a:bb:e9:d0:b0:01:b2:63:07:99:
46:cc:1e:c2:04:17:da:f6:10:a1:24:b2:f1:92:94:5c:
86:57:fa:11:f7:d7:65:da:4e:02:95:d0:cd:24:28:e3:
46:cd:a0:27:73:ca:40:ac:58:74:5e:e2:b2:dc:e7:30:
1d:20:23:1f:18:d9:4a:df:5c:b6:e8:41:eb:c7:ff:0d
Fingerprint (MD5):
E4:E0:8B:C2:D1:27:83:38:70:BC:C9:14:A6:37:4A:80
Fingerprint (SHA1):
72:CA:1C:96:DC:C5:D6:F8:87:9F:31:6F:C6:17:0A:E3:EF:54:DF:13
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #3397: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der
vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3398: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3399: Extension: Importing certificate Root.der to AllDB database - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3400: Extension: Importing certificate CA1Root.der to AllDB database - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3401: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED
chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root
vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190684 (0x432f909c)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:08 2012
Not After : Tue Nov 28 00:07:08 2062
Subject: "CN=Root ROOT CA,O=Root,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
bb:9f:87:ae:4c:2d:da:75:0c:c0:65:d2:c1:61:8c:84:
81:23:70:2e:93:d5:90:fb:98:40:a5:b9:50:31:f0:95:
38:30:66:e6:18:6d:87:65:f3:fe:7f:22:9f:24:b8:2b:
42:4d:fd:cd:bf:98:73:d7:b5:7f:8c:08:b6:6a:c3:49:
43:38:36:e8:ba:05:57:13:2b:04:b5:dd:f8:11:a0:fc:
bc:02:9d:c0:ae:9c:57:7b:9a:04:25:a8:a8:1d:9b:83:
46:ba:48:2c:12:11:b1:1e:93:3f:e6:fc:59:9f:a7:2d:
73:68:fd:e5:6c:cb:9e:d6:d1:a2:55:54:92:74:44:13
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
16:10:55:6f:89:b6:6f:ea:18:9d:6a:6a:cc:14:aa:dd:
2b:2a:e3:12:f1:42:72:a7:cb:a2:91:fd:d0:5c:43:d8:
bd:e1:b6:92:91:eb:3e:a6:c2:95:1f:55:98:d2:0d:96:
58:aa:5e:f1:c1:bd:ec:b7:99:8c:58:f5:e3:50:6f:8e:
89:59:f5:f9:d7:14:d2:0c:48:e5:80:1b:1f:95:31:6f:
b7:90:85:59:b9:ee:e6:a0:83:dc:7d:83:a2:53:fb:ce:
ae:94:67:7c:1d:a8:cb:0b:ad:b3:48:d8:15:80:78:c9:
4a:6f:5a:a4:2b:53:32:58:9d:b8:2a:86:e1:a5:25:be
Fingerprint (MD5):
69:56:3B:5D:22:52:A3:24:B5:BC:F1:E2:E6:FD:0E:EC
Fingerprint (SHA1):
90:03:C4:7B:72:23:C2:D1:2C:56:0F:4A:D0:74:0B:03:41:06:D1:20
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3402: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED
chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root
vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3403: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED
chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1
vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190685 (0x432f909d)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:09 2012
Not After : Tue Nov 28 00:07:09 2017
Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
c2:9b:50:80:d3:40:26:39:78:6d:b9:12:58:ba:f7:bd:
98:81:da:71:14:40:73:8f:e1:dc:d2:15:d0:92:4d:ca:
b2:c3:de:21:3b:6b:63:a2:f6:0b:95:d9:52:af:f4:9a:
fc:44:9c:78:7d:a2:90:df:a3:fe:26:3e:e7:7b:ed:1a:
0f:b9:fa:fe:be:f0:d5:e3:60:f8:27:75:2e:27:11:e9:
97:4c:92:5a:ef:1c:bf:8d:57:93:b2:23:b4:f2:b7:a0:
d8:27:b7:1c:1a:71:af:bd:c3:37:6a:e3:bd:69:75:65:
f4:ee:9f:13:5b:4a:6a:ac:31:d4:ce:05:89:95:db:fb
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: Certificate Policies
Data:
Policy Name: User Defined Policy OID
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
15:e6:65:8e:0c:b5:ae:ae:e6:d0:db:4c:9b:98:41:a5:
5f:a4:c3:2b:98:27:eb:8e:44:8e:09:4f:38:42:55:8c:
f3:4a:23:52:29:04:54:3c:ae:a8:2e:86:66:f6:cf:1d:
16:94:87:ed:2c:79:d5:88:a8:d6:52:8d:4d:39:eb:37:
17:ad:fb:3a:e2:45:1b:b4:09:00:43:2d:3e:d0:a6:dc:
82:5d:25:95:0b:0d:c2:e6:58:66:ea:d1:f3:4c:b0:99:
8b:87:1a:b1:b3:65:eb:0a:dd:e8:a5:7e:38:77:86:db:
54:d8:c8:d4:29:b9:88:c8:ee:a1:99:ea:73:e3:27:e7
Fingerprint (MD5):
15:4E:D0:FC:BA:AB:FA:21:34:0B:E1:58:DF:60:54:97
Fingerprint (SHA1):
BD:CE:B0:9B:39:A9:13:FE:73:2F:A3:BD:90:78:A3:1E:17:11:8A:D5
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3404: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED
chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1
vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3405: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED
chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2
vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190686 (0x432f909e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
Validity:
Not Before: Wed Nov 28 00:07:09 2012
Not After : Tue Nov 28 00:07:09 2017
Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
fa:aa:4f:96:6e:c5:61:0d:fd:ab:4f:c2:3c:01:58:14:
43:5d:9e:40:26:0f:99:ff:2d:bd:c6:43:87:5b:4a:73:
96:10:12:b1:29:91:55:3b:cd:ec:06:eb:01:1b:ba:46:
4f:16:c7:a7:1b:10:eb:95:09:1f:0c:9e:3d:16:fc:52:
e2:13:a3:be:c5:ca:65:49:6c:8f:ff:e8:16:e9:e4:43:
7e:3d:74:77:fb:7a:4a:b1:df:3d:42:04:72:5c:d2:78:
47:b3:4a:13:ff:de:b6:bc:f8:f3:e9:c1:b1:24:c9:1a:
be:5e:27:90:ed:49:a1:25:04:5b:74:3d:48:8e:00:cb
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: Certificate Policies
Data:
Policy Name: User Defined Policy OID
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
19:c2:82:43:f7:ae:69:a6:60:73:05:80:59:a0:cd:83:
86:8d:02:d4:6d:9b:33:60:0c:3d:18:32:5c:b2:cc:22:
bf:83:8d:fa:28:4c:7b:c6:05:6c:47:e3:3a:50:25:2b:
c3:35:a7:9b:9e:a4:0a:bb:e9:d0:b0:01:b2:63:07:99:
46:cc:1e:c2:04:17:da:f6:10:a1:24:b2:f1:92:94:5c:
86:57:fa:11:f7:d7:65:da:4e:02:95:d0:cd:24:28:e3:
46:cd:a0:27:73:ca:40:ac:58:74:5e:e2:b2:dc:e7:30:
1d:20:23:1f:18:d9:4a:df:5c:b6:e8:41:eb:c7:ff:0d
Fingerprint (MD5):
E4:E0:8B:C2:D1:27:83:38:70:BC:C9:14:A6:37:4A:80
Fingerprint (SHA1):
72:CA:1C:96:DC:C5:D6:F8:87:9F:31:6F:C6:17:0A:E3:EF:54:DF:13
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #3406: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED
chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2
vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3407: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3408: Extension2: Creating DB RootDB - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190688 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3409: Extension2: Creating Root CA Root - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3410: Extension2: Exporting Root CA Root.der - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3411: Extension2: Creating DB CA1DB - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3412: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127190689 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
y
OID.2.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3413: Extension2: Creating certficate CA1Root.der signed by Root - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3414: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3415: Extension2: Creating DB CA2DB - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3416: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127190690 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
y
OID.2.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3417: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3418: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #3419: Extension2: Creating DB User1DB - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o User1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3420: Extension2: Creating EE certifiate request User1Req.der - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1127190691 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3421: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #3422: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #3423: Extension2: Creating DB User2DB - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o User2Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3424: Extension2: Creating EE certifiate request User2Req.der - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1127190692 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
y
OID.2.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3425: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #3426: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3427: Extension2: Creating DB AllDB - PASSED
chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der
vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190688 (0x432f90a0)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:10 2012
Not After : Tue Nov 28 00:07:10 2062
Subject: "CN=Root ROOT CA,O=Root,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
e2:e1:bc:53:38:52:04:29:e7:1c:5e:f9:22:b6:59:ab:
fe:4b:35:27:3c:b1:02:36:f4:77:ec:7c:90:88:6e:e2:
46:49:40:d8:73:82:f6:40:67:60:6e:66:69:54:c3:b7:
ee:e6:91:81:f6:89:5c:04:a2:d5:5c:c8:4a:c9:60:16:
52:77:5e:ce:4b:58:8f:b1:53:30:90:21:1e:8b:f5:f9:
80:17:4b:53:03:38:c5:d3:02:c1:ad:ef:ed:f8:c0:27:
a2:5c:2b:eb:cf:95:f8:8a:bb:b4:7d:95:2d:44:d8:84:
01:e6:13:95:0a:0d:45:2d:a5:20:7c:09:9a:26:57:dd
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
4a:2b:72:b2:c8:ce:e3:02:88:8c:63:17:2c:f3:5f:bd:
f7:11:61:8a:54:ac:b8:c8:d0:0f:a0:39:17:94:25:9c:
12:88:c4:ed:e5:84:9a:f5:a9:5f:a7:f7:21:60:73:ed:
db:b9:b5:d3:be:03:dc:58:bc:14:31:04:5e:18:9b:d7:
f6:60:be:46:db:e7:0e:92:ae:fb:36:ee:52:72:8f:30:
b0:94:ce:4d:73:f0:68:1a:5b:a8:27:0e:a7:a3:19:1d:
ed:37:ec:05:30:4a:c6:8d:96:b8:61:62:d6:5e:df:73:
e4:46:89:6f:16:01:be:ad:de:d5:0b:ee:33:5c:a6:5e
Fingerprint (MD5):
23:E7:05:0F:1C:64:A8:EE:5B:DB:7E:F2:D1:57:8C:67
Fingerprint (SHA1):
7F:8F:FF:EA:33:6C:32:DD:E5:F7:8A:D3:7D:C9:D6:F7:4A:8A:7D:DD
Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3428: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED
chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der
vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3429: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED
chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der
vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190689 (0x432f90a1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:11 2012
Not After : Tue Nov 28 00:07:11 2017
Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
ca:00:9a:db:74:d7:1b:75:f0:6f:7e:4d:5c:98:b7:f5:
f5:91:64:7f:5d:8d:d9:f5:8d:59:ed:bf:0c:c4:c5:16:
09:ee:68:39:80:c6:4a:0e:2d:28:11:11:fb:a6:76:b9:
55:82:6b:14:fb:13:e7:1e:a9:c9:a6:3b:e6:f3:18:8a:
6d:92:a4:b1:1f:10:35:03:ee:27:53:7e:fd:64:c1:7f:
f5:c2:be:5b:31:4a:de:a4:ed:e7:5e:1f:1c:51:04:64:
ec:52:68:06:a6:9d:92:20:63:d1:51:93:0e:45:ef:17:
00:2f:bd:b8:41:96:5d:f3:81:1c:77:a8:86:6a:43:bd
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: Certificate Policies
Data:
Policy Name: User Defined Policy OID
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Policy Name: OID.2.0
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
3a:b6:67:d6:13:78:32:05:8d:a2:cc:cb:18:38:8e:e9:
94:69:40:d0:d5:74:6f:45:b6:2a:f3:bb:b5:8b:88:e8:
fd:4c:89:ae:1e:dc:d1:b6:dc:80:ed:22:bf:7f:75:bf:
85:10:24:9c:4d:eb:05:72:47:3c:86:8f:01:9a:fc:75:
6f:72:55:e2:99:c4:27:11:48:79:a0:ba:12:8e:3d:b7:
e9:1d:cc:e1:cc:34:48:5a:f1:6b:80:4c:32:b9:26:6c:
82:96:97:1c:fe:45:c4:22:3d:21:36:a2:ac:d2:be:68:
de:1e:cf:88:ea:5c:ab:7d:4f:fd:9e:4d:78:e7:b8:95
Fingerprint (MD5):
46:F1:D6:E5:BA:F1:C3:74:CC:07:2D:DC:EF:FB:19:14
Fingerprint (SHA1):
13:B4:9F:07:E0:5C:8F:72:A7:ED:46:83:E5:4A:FD:40:E0:68:3E:DE
Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3430: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der
vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3431: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der
vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190690 (0x432f90a2)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
Validity:
Not Before: Wed Nov 28 00:07:11 2012
Not After : Tue Nov 28 00:07:11 2017
Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
f0:40:01:f9:59:63:e0:ae:75:b4:69:d4:aa:ca:ff:8c:
43:91:b9:c5:2e:ba:92:03:ed:e8:a0:44:2a:64:53:4c:
b9:67:83:72:cd:c7:0d:10:fe:e4:b1:67:37:50:8c:a5:
4e:92:ca:94:33:ee:45:67:0b:c2:f2:af:aa:66:11:43:
7f:f3:14:a7:f3:a7:2b:f3:4d:b2:fb:29:ed:85:af:3b:
f3:dc:ed:74:1e:d4:0a:87:27:43:d6:80:70:f5:cf:e8:
2f:ad:d0:79:65:14:ef:eb:db:4b:f2:d3:d2:d4:1e:06:
eb:0b:2a:9d:0b:73:98:19:14:72:de:8f:b1:41:10:f3
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: Certificate Policies
Data:
Policy Name: User Defined Policy OID
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Policy Name: OID.2.0
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
a6:f0:4f:7c:e8:00:9a:f9:30:8a:25:08:df:57:f2:87:
42:53:85:19:a2:23:51:a4:de:b0:e6:cb:c2:a8:3f:ba:
5b:02:0c:9f:d1:5b:67:66:e6:35:41:4d:c2:fe:00:5f:
f4:1d:df:8e:c8:e1:e6:ac:b0:38:9b:fa:d7:71:b5:15:
9a:79:6c:2f:c4:9e:7a:fb:4f:ce:ce:0b:80:73:07:61:
f8:31:5c:b5:45:60:43:f3:64:26:1a:7b:fe:6d:94:0b:
82:08:df:3a:ee:6d:a8:c7:d1:5c:93:b6:d5:bc:98:0f:
f7:2f:06:0f:e5:9f:c8:92:11:59:c3:94:f7:53:f2:83
Fingerprint (MD5):
32:E2:4B:40:26:F2:36:88:E4:00:BB:07:93:0B:D6:AE
Fingerprint (SHA1):
20:21:56:5B:75:9F:A8:5C:19:88:59:32:64:C9:A9:CD:1B:E8:EA:1D
Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3432: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der
vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3433: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3434: Extension2: Importing certificate Root.der to AllDB database - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3435: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3436: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED
chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root
vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190688 (0x432f90a0)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:10 2012
Not After : Tue Nov 28 00:07:10 2062
Subject: "CN=Root ROOT CA,O=Root,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
e2:e1:bc:53:38:52:04:29:e7:1c:5e:f9:22:b6:59:ab:
fe:4b:35:27:3c:b1:02:36:f4:77:ec:7c:90:88:6e:e2:
46:49:40:d8:73:82:f6:40:67:60:6e:66:69:54:c3:b7:
ee:e6:91:81:f6:89:5c:04:a2:d5:5c:c8:4a:c9:60:16:
52:77:5e:ce:4b:58:8f:b1:53:30:90:21:1e:8b:f5:f9:
80:17:4b:53:03:38:c5:d3:02:c1:ad:ef:ed:f8:c0:27:
a2:5c:2b:eb:cf:95:f8:8a:bb:b4:7d:95:2d:44:d8:84:
01:e6:13:95:0a:0d:45:2d:a5:20:7c:09:9a:26:57:dd
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
4a:2b:72:b2:c8:ce:e3:02:88:8c:63:17:2c:f3:5f:bd:
f7:11:61:8a:54:ac:b8:c8:d0:0f:a0:39:17:94:25:9c:
12:88:c4:ed:e5:84:9a:f5:a9:5f:a7:f7:21:60:73:ed:
db:b9:b5:d3:be:03:dc:58:bc:14:31:04:5e:18:9b:d7:
f6:60:be:46:db:e7:0e:92:ae:fb:36:ee:52:72:8f:30:
b0:94:ce:4d:73:f0:68:1a:5b:a8:27:0e:a7:a3:19:1d:
ed:37:ec:05:30:4a:c6:8d:96:b8:61:62:d6:5e:df:73:
e4:46:89:6f:16:01:be:ad:de:d5:0b:ee:33:5c:a6:5e
Fingerprint (MD5):
23:E7:05:0F:1C:64:A8:EE:5B:DB:7E:F2:D1:57:8C:67
Fingerprint (SHA1):
7F:8F:FF:EA:33:6C:32:DD:E5:F7:8A:D3:7D:C9:D6:F7:4A:8A:7D:DD
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3437: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED
chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root
vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3438: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED
chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1
vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190689 (0x432f90a1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:11 2012
Not After : Tue Nov 28 00:07:11 2017
Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
ca:00:9a:db:74:d7:1b:75:f0:6f:7e:4d:5c:98:b7:f5:
f5:91:64:7f:5d:8d:d9:f5:8d:59:ed:bf:0c:c4:c5:16:
09:ee:68:39:80:c6:4a:0e:2d:28:11:11:fb:a6:76:b9:
55:82:6b:14:fb:13:e7:1e:a9:c9:a6:3b:e6:f3:18:8a:
6d:92:a4:b1:1f:10:35:03:ee:27:53:7e:fd:64:c1:7f:
f5:c2:be:5b:31:4a:de:a4:ed:e7:5e:1f:1c:51:04:64:
ec:52:68:06:a6:9d:92:20:63:d1:51:93:0e:45:ef:17:
00:2f:bd:b8:41:96:5d:f3:81:1c:77:a8:86:6a:43:bd
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: Certificate Policies
Data:
Policy Name: User Defined Policy OID
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Policy Name: OID.2.0
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
3a:b6:67:d6:13:78:32:05:8d:a2:cc:cb:18:38:8e:e9:
94:69:40:d0:d5:74:6f:45:b6:2a:f3:bb:b5:8b:88:e8:
fd:4c:89:ae:1e:dc:d1:b6:dc:80:ed:22:bf:7f:75:bf:
85:10:24:9c:4d:eb:05:72:47:3c:86:8f:01:9a:fc:75:
6f:72:55:e2:99:c4:27:11:48:79:a0:ba:12:8e:3d:b7:
e9:1d:cc:e1:cc:34:48:5a:f1:6b:80:4c:32:b9:26:6c:
82:96:97:1c:fe:45:c4:22:3d:21:36:a2:ac:d2:be:68:
de:1e:cf:88:ea:5c:ab:7d:4f:fd:9e:4d:78:e7:b8:95
Fingerprint (MD5):
46:F1:D6:E5:BA:F1:C3:74:CC:07:2D:DC:EF:FB:19:14
Fingerprint (SHA1):
13:B4:9F:07:E0:5C:8F:72:A7:ED:46:83:E5:4A:FD:40:E0:68:3E:DE
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3439: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED
chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1
vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3440: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED
chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2
vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190690 (0x432f90a2)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
Validity:
Not Before: Wed Nov 28 00:07:11 2012
Not After : Tue Nov 28 00:07:11 2017
Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
f0:40:01:f9:59:63:e0:ae:75:b4:69:d4:aa:ca:ff:8c:
43:91:b9:c5:2e:ba:92:03:ed:e8:a0:44:2a:64:53:4c:
b9:67:83:72:cd:c7:0d:10:fe:e4:b1:67:37:50:8c:a5:
4e:92:ca:94:33:ee:45:67:0b:c2:f2:af:aa:66:11:43:
7f:f3:14:a7:f3:a7:2b:f3:4d:b2:fb:29:ed:85:af:3b:
f3:dc:ed:74:1e:d4:0a:87:27:43:d6:80:70:f5:cf:e8:
2f:ad:d0:79:65:14:ef:eb:db:4b:f2:d3:d2:d4:1e:06:
eb:0b:2a:9d:0b:73:98:19:14:72:de:8f:b1:41:10:f3
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: Certificate Policies
Data:
Policy Name: User Defined Policy OID
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Policy Name: OID.2.0
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
a6:f0:4f:7c:e8:00:9a:f9:30:8a:25:08:df:57:f2:87:
42:53:85:19:a2:23:51:a4:de:b0:e6:cb:c2:a8:3f:ba:
5b:02:0c:9f:d1:5b:67:66:e6:35:41:4d:c2:fe:00:5f:
f4:1d:df:8e:c8:e1:e6:ac:b0:38:9b:fa:d7:71:b5:15:
9a:79:6c:2f:c4:9e:7a:fb:4f:ce:ce:0b:80:73:07:61:
f8:31:5c:b5:45:60:43:f3:64:26:1a:7b:fe:6d:94:0b:
82:08:df:3a:ee:6d:a8:c7:d1:5c:93:b6:d5:bc:98:0f:
f7:2f:06:0f:e5:9f:c8:92:11:59:c3:94:f7:53:f2:83
Fingerprint (MD5):
32:E2:4B:40:26:F2:36:88:E4:00:BB:07:93:0B:D6:AE
Fingerprint (SHA1):
20:21:56:5B:75:9F:A8:5C:19:88:59:32:64:C9:A9:CD:1B:E8:EA:1D
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3441: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED
chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2
vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3442: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED
chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root
vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190688 (0x432f90a0)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:10 2012
Not After : Tue Nov 28 00:07:10 2062
Subject: "CN=Root ROOT CA,O=Root,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
e2:e1:bc:53:38:52:04:29:e7:1c:5e:f9:22:b6:59:ab:
fe:4b:35:27:3c:b1:02:36:f4:77:ec:7c:90:88:6e:e2:
46:49:40:d8:73:82:f6:40:67:60:6e:66:69:54:c3:b7:
ee:e6:91:81:f6:89:5c:04:a2:d5:5c:c8:4a:c9:60:16:
52:77:5e:ce:4b:58:8f:b1:53:30:90:21:1e:8b:f5:f9:
80:17:4b:53:03:38:c5:d3:02:c1:ad:ef:ed:f8:c0:27:
a2:5c:2b:eb:cf:95:f8:8a:bb:b4:7d:95:2d:44:d8:84:
01:e6:13:95:0a:0d:45:2d:a5:20:7c:09:9a:26:57:dd
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
4a:2b:72:b2:c8:ce:e3:02:88:8c:63:17:2c:f3:5f:bd:
f7:11:61:8a:54:ac:b8:c8:d0:0f:a0:39:17:94:25:9c:
12:88:c4:ed:e5:84:9a:f5:a9:5f:a7:f7:21:60:73:ed:
db:b9:b5:d3:be:03:dc:58:bc:14:31:04:5e:18:9b:d7:
f6:60:be:46:db:e7:0e:92:ae:fb:36:ee:52:72:8f:30:
b0:94:ce:4d:73:f0:68:1a:5b:a8:27:0e:a7:a3:19:1d:
ed:37:ec:05:30:4a:c6:8d:96:b8:61:62:d6:5e:df:73:
e4:46:89:6f:16:01:be:ad:de:d5:0b:ee:33:5c:a6:5e
Fingerprint (MD5):
23:E7:05:0F:1C:64:A8:EE:5B:DB:7E:F2:D1:57:8C:67
Fingerprint (SHA1):
7F:8F:FF:EA:33:6C:32:DD:E5:F7:8A:D3:7D:C9:D6:F7:4A:8A:7D:DD
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3443: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED
chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root
vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190688 (0x432f90a0)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:10 2012
Not After : Tue Nov 28 00:07:10 2062
Subject: "CN=Root ROOT CA,O=Root,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
e2:e1:bc:53:38:52:04:29:e7:1c:5e:f9:22:b6:59:ab:
fe:4b:35:27:3c:b1:02:36:f4:77:ec:7c:90:88:6e:e2:
46:49:40:d8:73:82:f6:40:67:60:6e:66:69:54:c3:b7:
ee:e6:91:81:f6:89:5c:04:a2:d5:5c:c8:4a:c9:60:16:
52:77:5e:ce:4b:58:8f:b1:53:30:90:21:1e:8b:f5:f9:
80:17:4b:53:03:38:c5:d3:02:c1:ad:ef:ed:f8:c0:27:
a2:5c:2b:eb:cf:95:f8:8a:bb:b4:7d:95:2d:44:d8:84:
01:e6:13:95:0a:0d:45:2d:a5:20:7c:09:9a:26:57:dd
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
4a:2b:72:b2:c8:ce:e3:02:88:8c:63:17:2c:f3:5f:bd:
f7:11:61:8a:54:ac:b8:c8:d0:0f:a0:39:17:94:25:9c:
12:88:c4:ed:e5:84:9a:f5:a9:5f:a7:f7:21:60:73:ed:
db:b9:b5:d3:be:03:dc:58:bc:14:31:04:5e:18:9b:d7:
f6:60:be:46:db:e7:0e:92:ae:fb:36:ee:52:72:8f:30:
b0:94:ce:4d:73:f0:68:1a:5b:a8:27:0e:a7:a3:19:1d:
ed:37:ec:05:30:4a:c6:8d:96:b8:61:62:d6:5e:df:73:
e4:46:89:6f:16:01:be:ad:de:d5:0b:ee:33:5c:a6:5e
Fingerprint (MD5):
23:E7:05:0F:1C:64:A8:EE:5B:DB:7E:F2:D1:57:8C:67
Fingerprint (SHA1):
7F:8F:FF:EA:33:6C:32:DD:E5:F7:8A:D3:7D:C9:D6:F7:4A:8A:7D:DD
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3444: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED
chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1
vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190689 (0x432f90a1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:11 2012
Not After : Tue Nov 28 00:07:11 2017
Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
ca:00:9a:db:74:d7:1b:75:f0:6f:7e:4d:5c:98:b7:f5:
f5:91:64:7f:5d:8d:d9:f5:8d:59:ed:bf:0c:c4:c5:16:
09:ee:68:39:80:c6:4a:0e:2d:28:11:11:fb:a6:76:b9:
55:82:6b:14:fb:13:e7:1e:a9:c9:a6:3b:e6:f3:18:8a:
6d:92:a4:b1:1f:10:35:03:ee:27:53:7e:fd:64:c1:7f:
f5:c2:be:5b:31:4a:de:a4:ed:e7:5e:1f:1c:51:04:64:
ec:52:68:06:a6:9d:92:20:63:d1:51:93:0e:45:ef:17:
00:2f:bd:b8:41:96:5d:f3:81:1c:77:a8:86:6a:43:bd
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: Certificate Policies
Data:
Policy Name: User Defined Policy OID
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Policy Name: OID.2.0
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
3a:b6:67:d6:13:78:32:05:8d:a2:cc:cb:18:38:8e:e9:
94:69:40:d0:d5:74:6f:45:b6:2a:f3:bb:b5:8b:88:e8:
fd:4c:89:ae:1e:dc:d1:b6:dc:80:ed:22:bf:7f:75:bf:
85:10:24:9c:4d:eb:05:72:47:3c:86:8f:01:9a:fc:75:
6f:72:55:e2:99:c4:27:11:48:79:a0:ba:12:8e:3d:b7:
e9:1d:cc:e1:cc:34:48:5a:f1:6b:80:4c:32:b9:26:6c:
82:96:97:1c:fe:45:c4:22:3d:21:36:a2:ac:d2:be:68:
de:1e:cf:88:ea:5c:ab:7d:4f:fd:9e:4d:78:e7:b8:95
Fingerprint (MD5):
46:F1:D6:E5:BA:F1:C3:74:CC:07:2D:DC:EF:FB:19:14
Fingerprint (SHA1):
13:B4:9F:07:E0:5C:8F:72:A7:ED:46:83:E5:4A:FD:40:E0:68:3E:DE
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3445: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED
chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1
vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190689 (0x432f90a1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:11 2012
Not After : Tue Nov 28 00:07:11 2017
Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
ca:00:9a:db:74:d7:1b:75:f0:6f:7e:4d:5c:98:b7:f5:
f5:91:64:7f:5d:8d:d9:f5:8d:59:ed:bf:0c:c4:c5:16:
09:ee:68:39:80:c6:4a:0e:2d:28:11:11:fb:a6:76:b9:
55:82:6b:14:fb:13:e7:1e:a9:c9:a6:3b:e6:f3:18:8a:
6d:92:a4:b1:1f:10:35:03:ee:27:53:7e:fd:64:c1:7f:
f5:c2:be:5b:31:4a:de:a4:ed:e7:5e:1f:1c:51:04:64:
ec:52:68:06:a6:9d:92:20:63:d1:51:93:0e:45:ef:17:
00:2f:bd:b8:41:96:5d:f3:81:1c:77:a8:86:6a:43:bd
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: Certificate Policies
Data:
Policy Name: OID.1.0
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Policy Name: User Defined Policy OID
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
3a:b6:67:d6:13:78:32:05:8d:a2:cc:cb:18:38:8e:e9:
94:69:40:d0:d5:74:6f:45:b6:2a:f3:bb:b5:8b:88:e8:
fd:4c:89:ae:1e:dc:d1:b6:dc:80:ed:22:bf:7f:75:bf:
85:10:24:9c:4d:eb:05:72:47:3c:86:8f:01:9a:fc:75:
6f:72:55:e2:99:c4:27:11:48:79:a0:ba:12:8e:3d:b7:
e9:1d:cc:e1:cc:34:48:5a:f1:6b:80:4c:32:b9:26:6c:
82:96:97:1c:fe:45:c4:22:3d:21:36:a2:ac:d2:be:68:
de:1e:cf:88:ea:5c:ab:7d:4f:fd:9e:4d:78:e7:b8:95
Fingerprint (MD5):
46:F1:D6:E5:BA:F1:C3:74:CC:07:2D:DC:EF:FB:19:14
Fingerprint (SHA1):
13:B4:9F:07:E0:5C:8F:72:A7:ED:46:83:E5:4A:FD:40:E0:68:3E:DE
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3446: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED
chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2
vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190690 (0x432f90a2)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
Validity:
Not Before: Wed Nov 28 00:07:11 2012
Not After : Tue Nov 28 00:07:11 2017
Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
f0:40:01:f9:59:63:e0:ae:75:b4:69:d4:aa:ca:ff:8c:
43:91:b9:c5:2e:ba:92:03:ed:e8:a0:44:2a:64:53:4c:
b9:67:83:72:cd:c7:0d:10:fe:e4:b1:67:37:50:8c:a5:
4e:92:ca:94:33:ee:45:67:0b:c2:f2:af:aa:66:11:43:
7f:f3:14:a7:f3:a7:2b:f3:4d:b2:fb:29:ed:85:af:3b:
f3:dc:ed:74:1e:d4:0a:87:27:43:d6:80:70:f5:cf:e8:
2f:ad:d0:79:65:14:ef:eb:db:4b:f2:d3:d2:d4:1e:06:
eb:0b:2a:9d:0b:73:98:19:14:72:de:8f:b1:41:10:f3
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: Certificate Policies
Data:
Policy Name: User Defined Policy OID
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Policy Name: OID.2.0
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
a6:f0:4f:7c:e8:00:9a:f9:30:8a:25:08:df:57:f2:87:
42:53:85:19:a2:23:51:a4:de:b0:e6:cb:c2:a8:3f:ba:
5b:02:0c:9f:d1:5b:67:66:e6:35:41:4d:c2:fe:00:5f:
f4:1d:df:8e:c8:e1:e6:ac:b0:38:9b:fa:d7:71:b5:15:
9a:79:6c:2f:c4:9e:7a:fb:4f:ce:ce:0b:80:73:07:61:
f8:31:5c:b5:45:60:43:f3:64:26:1a:7b:fe:6d:94:0b:
82:08:df:3a:ee:6d:a8:c7:d1:5c:93:b6:d5:bc:98:0f:
f7:2f:06:0f:e5:9f:c8:92:11:59:c3:94:f7:53:f2:83
Fingerprint (MD5):
32:E2:4B:40:26:F2:36:88:E4:00:BB:07:93:0B:D6:AE
Fingerprint (SHA1):
20:21:56:5B:75:9F:A8:5C:19:88:59:32:64:C9:A9:CD:1B:E8:EA:1D
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3447: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED
chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2
vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190690 (0x432f90a2)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
Validity:
Not Before: Wed Nov 28 00:07:11 2012
Not After : Tue Nov 28 00:07:11 2017
Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
f0:40:01:f9:59:63:e0:ae:75:b4:69:d4:aa:ca:ff:8c:
43:91:b9:c5:2e:ba:92:03:ed:e8:a0:44:2a:64:53:4c:
b9:67:83:72:cd:c7:0d:10:fe:e4:b1:67:37:50:8c:a5:
4e:92:ca:94:33:ee:45:67:0b:c2:f2:af:aa:66:11:43:
7f:f3:14:a7:f3:a7:2b:f3:4d:b2:fb:29:ed:85:af:3b:
f3:dc:ed:74:1e:d4:0a:87:27:43:d6:80:70:f5:cf:e8:
2f:ad:d0:79:65:14:ef:eb:db:4b:f2:d3:d2:d4:1e:06:
eb:0b:2a:9d:0b:73:98:19:14:72:de:8f:b1:41:10:f3
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: Certificate Policies
Data:
Policy Name: OID.1.0
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Policy Name: User Defined Policy OID
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
a6:f0:4f:7c:e8:00:9a:f9:30:8a:25:08:df:57:f2:87:
42:53:85:19:a2:23:51:a4:de:b0:e6:cb:c2:a8:3f:ba:
5b:02:0c:9f:d1:5b:67:66:e6:35:41:4d:c2:fe:00:5f:
f4:1d:df:8e:c8:e1:e6:ac:b0:38:9b:fa:d7:71:b5:15:
9a:79:6c:2f:c4:9e:7a:fb:4f:ce:ce:0b:80:73:07:61:
f8:31:5c:b5:45:60:43:f3:64:26:1a:7b:fe:6d:94:0b:
82:08:df:3a:ee:6d:a8:c7:d1:5c:93:b6:d5:bc:98:0f:
f7:2f:06:0f:e5:9f:c8:92:11:59:c3:94:f7:53:f2:83
Fingerprint (MD5):
32:E2:4B:40:26:F2:36:88:E4:00:BB:07:93:0B:D6:AE
Fingerprint (SHA1):
20:21:56:5B:75:9F:A8:5C:19:88:59:32:64:C9:A9:CD:1B:E8:EA:1D
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3448: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #3449: AnyPolicy: Creating DB RootCADB - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190693 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3450: AnyPolicy: Creating Root CA RootCA - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #3451: AnyPolicy: Exporting Root CA RootCA.der - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3452: AnyPolicy: Creating DB CA1DB - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3453: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1127190694 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3454: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #3455: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3456: AnyPolicy: Creating DB CA2DB - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3457: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127190695 --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
0
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3458: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3459: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #3460: AnyPolicy: Creating DB CA3DB - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA3Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3461: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED
chains.sh: Creating certficate CA3CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1127190696 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3462: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate CA3CA1.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der
chains.sh: #3463: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #3464: AnyPolicy: Creating DB User1DB - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o User1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3465: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1127190697 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3466: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #3467: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #3468: AnyPolicy: Creating DB User2DB - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o User2Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3469: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1127190698 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3470: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #3471: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED
chains.sh: Creating DB User3DB
certutil -N -d User3DB -f User3DB/dbpasswd
chains.sh: #3472: AnyPolicy: Creating DB User3DB - PASSED
chains.sh: Creating EE certifiate request User3Req.der
certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o User3Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3473: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED
chains.sh: Creating certficate User3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1127190699 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3474: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED
chains.sh: Importing certificate User3CA3.der to User3DB database
certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der
chains.sh: #3475: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3476: AnyPolicy: Creating DB AllDB - PASSED
chains.sh: Importing certificate RootCA.der to AllDB database
certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der
chains.sh: #3477: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED
chains.sh: Importing certificate CA1RootCA.der to AllDB database
certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der
chains.sh: #3478: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3479: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED
chains.sh: Importing certificate CA3CA1.der to AllDB database
certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der
chains.sh: #3480: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED
chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA
vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190693 (0x432f90a5)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
Validity:
Not Before: Wed Nov 28 00:07:13 2012
Not After : Tue Nov 28 00:07:13 2062
Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
dc:1b:de:2c:75:5c:57:bb:56:f3:6a:46:0a:d1:23:92:
62:1f:5e:f8:a7:cf:5b:92:88:f8:25:6e:e7:3b:9f:f5:
32:0d:e4:ee:79:b6:25:0d:da:57:5c:4f:65:6a:28:50:
bd:e9:a4:8d:2c:c9:6a:bd:16:05:fa:dc:14:bd:2b:08:
49:34:0d:52:42:4a:42:df:7e:45:b3:08:b9:2d:d0:15:
51:77:6a:61:b7:db:d1:6e:03:c8:e0:4c:1a:36:1a:69:
ae:23:c5:0d:9c:65:bc:f0:67:53:15:26:91:be:34:ee:
eb:90:86:05:c3:10:43:56:01:0b:01:07:75:0b:56:c9
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7a:9a:07:e9:5e:bb:37:c7:13:b2:aa:40:c8:5b:aa:0b:
93:3f:ad:c5:b9:43:b8:88:41:d5:2e:12:b0:c9:3d:4b:
b4:ed:9e:fa:4b:df:78:4f:40:8d:d2:2c:ce:dd:e6:7d:
05:7c:e3:15:62:d5:c8:94:23:ff:39:da:79:52:86:c5:
34:5b:50:8f:6d:52:1b:4f:f5:13:95:c8:8b:7b:52:b4:
44:b1:df:55:a3:be:9b:47:92:21:be:db:c5:ff:69:aa:
1a:7b:f2:a0:13:54:aa:5a:05:a6:d1:a7:0b:6a:9a:91:
94:36:4a:49:cb:b7:8e:56:16:e2:d0:82:d2:cf:a6:0f
Fingerprint (MD5):
36:30:65:BA:D7:AC:7E:74:C2:7D:F1:88:9E:4F:00:87
Fingerprint (SHA1):
78:5E:88:72:75:07:76:96:3B:52:01:AD:69:7B:F4:2B:5D:02:E1:E8
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3481: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED
chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA
vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3482: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED
chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA
vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3483: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED
chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA
vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3484: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED
chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA
vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190693 (0x432f90a5)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
Validity:
Not Before: Wed Nov 28 00:07:13 2012
Not After : Tue Nov 28 00:07:13 2062
Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
dc:1b:de:2c:75:5c:57:bb:56:f3:6a:46:0a:d1:23:92:
62:1f:5e:f8:a7:cf:5b:92:88:f8:25:6e:e7:3b:9f:f5:
32:0d:e4:ee:79:b6:25:0d:da:57:5c:4f:65:6a:28:50:
bd:e9:a4:8d:2c:c9:6a:bd:16:05:fa:dc:14:bd:2b:08:
49:34:0d:52:42:4a:42:df:7e:45:b3:08:b9:2d:d0:15:
51:77:6a:61:b7:db:d1:6e:03:c8:e0:4c:1a:36:1a:69:
ae:23:c5:0d:9c:65:bc:f0:67:53:15:26:91:be:34:ee:
eb:90:86:05:c3:10:43:56:01:0b:01:07:75:0b:56:c9
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7a:9a:07:e9:5e:bb:37:c7:13:b2:aa:40:c8:5b:aa:0b:
93:3f:ad:c5:b9:43:b8:88:41:d5:2e:12:b0:c9:3d:4b:
b4:ed:9e:fa:4b:df:78:4f:40:8d:d2:2c:ce:dd:e6:7d:
05:7c:e3:15:62:d5:c8:94:23:ff:39:da:79:52:86:c5:
34:5b:50:8f:6d:52:1b:4f:f5:13:95:c8:8b:7b:52:b4:
44:b1:df:55:a3:be:9b:47:92:21:be:db:c5:ff:69:aa:
1a:7b:f2:a0:13:54:aa:5a:05:a6:d1:a7:0b:6a:9a:91:
94:36:4a:49:cb:b7:8e:56:16:e2:d0:82:d2:cf:a6:0f
Fingerprint (MD5):
36:30:65:BA:D7:AC:7E:74:C2:7D:F1:88:9E:4F:00:87
Fingerprint (SHA1):
78:5E:88:72:75:07:76:96:3B:52:01:AD:69:7B:F4:2B:5D:02:E1:E8
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User3 EE,O=User3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3485: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED
chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA
vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3486: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #3487: AnyPolicyWithLevel: Creating DB RootCADB - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190700 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3488: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #3489: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3490: AnyPolicyWithLevel: Creating DB CA1DB - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3491: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1127190701 --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
n
n
1
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3492: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #3493: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED
chains.sh: Creating DB CA12DB
certutil -N -d CA12DB -f CA12DB/dbpasswd
chains.sh: #3494: AnyPolicyWithLevel: Creating DB CA12DB - PASSED
chains.sh: Creating Intermediate certifiate request CA12Req.der
certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA12Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3495: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED
chains.sh: Creating certficate CA12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1127190702 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3496: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate CA12CA1.der to CA12DB database
certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der
chains.sh: #3497: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED
chains.sh: Creating DB CA13DB
certutil -N -d CA13DB -f CA13DB/dbpasswd
chains.sh: #3498: AnyPolicyWithLevel: Creating DB CA13DB - PASSED
chains.sh: Creating Intermediate certifiate request CA13Req.der
certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA13Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3499: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED
chains.sh: Creating certficate CA13CA12.der signed by CA12
certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1127190703 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3500: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED
chains.sh: Importing certificate CA13CA12.der to CA13DB database
certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der
chains.sh: #3501: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3502: AnyPolicyWithLevel: Creating DB EE1DB - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3503: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED
chains.sh: Creating certficate EE1CA13.der signed by CA13
certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1127190704 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3504: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED
chains.sh: Importing certificate EE1CA13.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der
chains.sh: #3505: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED
chains.sh: Creating DB CA22DB
certutil -N -d CA22DB -f CA22DB/dbpasswd
chains.sh: #3506: AnyPolicyWithLevel: Creating DB CA22DB - PASSED
chains.sh: Creating Intermediate certifiate request CA22Req.der
certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA22Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3507: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED
chains.sh: Creating certficate CA22CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1127190705 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3508: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate CA22CA1.der to CA22DB database
certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der
chains.sh: #3509: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED
chains.sh: Creating DB CA23DB
certutil -N -d CA23DB -f CA23DB/dbpasswd
chains.sh: #3510: AnyPolicyWithLevel: Creating DB CA23DB - PASSED
chains.sh: Creating Intermediate certifiate request CA23Req.der
certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA23Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3511: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED
chains.sh: Creating certficate CA23CA22.der signed by CA22
certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1127190706 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3512: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED
chains.sh: Importing certificate CA23CA22.der to CA23DB database
certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der
chains.sh: #3513: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3514: AnyPolicyWithLevel: Creating DB EE2DB - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE2Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3515: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED
chains.sh: Creating certficate EE2CA23.der signed by CA23
certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1127190707 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3516: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED
chains.sh: Importing certificate EE2CA23.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der
chains.sh: #3517: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED
chains.sh: Creating DB CA32DB
certutil -N -d CA32DB -f CA32DB/dbpasswd
chains.sh: #3518: AnyPolicyWithLevel: Creating DB CA32DB - PASSED
chains.sh: Creating Intermediate certifiate request CA32Req.der
certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA32Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3519: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED
chains.sh: Creating certficate CA32CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1127190708 --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
n
n
1
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3520: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate CA32CA1.der to CA32DB database
certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der
chains.sh: #3521: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED
chains.sh: Creating DB CA33DB
certutil -N -d CA33DB -f CA33DB/dbpasswd
chains.sh: #3522: AnyPolicyWithLevel: Creating DB CA33DB - PASSED
chains.sh: Creating Intermediate certifiate request CA33Req.der
certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA33Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3523: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED
chains.sh: Creating certficate CA33CA32.der signed by CA32
certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1127190709 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3524: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED
chains.sh: Importing certificate CA33CA32.der to CA33DB database
certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der
chains.sh: #3525: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #3526: AnyPolicyWithLevel: Creating DB EE3DB - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE3Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3527: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED
chains.sh: Creating certficate EE3CA33.der signed by CA33
certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1127190710 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3528: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED
chains.sh: Importing certificate EE3CA33.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der
chains.sh: #3529: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED
chains.sh: Creating DB CA42DB
certutil -N -d CA42DB -f CA42DB/dbpasswd
chains.sh: #3530: AnyPolicyWithLevel: Creating DB CA42DB - PASSED
chains.sh: Creating Intermediate certifiate request CA42Req.der
certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA42Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3531: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED
chains.sh: Creating certficate CA42CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1127190711 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
y
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3532: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate CA42CA1.der to CA42DB database
certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der
chains.sh: #3533: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED
chains.sh: Creating DB CA43DB
certutil -N -d CA43DB -f CA43DB/dbpasswd
chains.sh: #3534: AnyPolicyWithLevel: Creating DB CA43DB - PASSED
chains.sh: Creating Intermediate certifiate request CA43Req.der
certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA43Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3535: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED
chains.sh: Creating certficate CA43CA42.der signed by CA42
certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1127190712 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
y
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3536: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED
chains.sh: Importing certificate CA43CA42.der to CA43DB database
certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der
chains.sh: #3537: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #3538: AnyPolicyWithLevel: Creating DB EE4DB - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE4Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3539: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED
chains.sh: Creating certficate EE4CA43.der signed by CA43
certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1127190713 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3540: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED
chains.sh: Importing certificate EE4CA43.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der
chains.sh: #3541: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED
chains.sh: Creating DB CA52DB
certutil -N -d CA52DB -f CA52DB/dbpasswd
chains.sh: #3542: AnyPolicyWithLevel: Creating DB CA52DB - PASSED
chains.sh: Creating Intermediate certifiate request CA52Req.der
certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA52Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3543: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED
chains.sh: Creating certficate CA52CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1127190714 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
y
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3544: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate CA52CA1.der to CA52DB database
certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der
chains.sh: #3545: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED
chains.sh: Creating DB CA53DB
certutil -N -d CA53DB -f CA53DB/dbpasswd
chains.sh: #3546: AnyPolicyWithLevel: Creating DB CA53DB - PASSED
chains.sh: Creating Intermediate certifiate request CA53Req.der
certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA53Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3547: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED
chains.sh: Creating certficate CA53CA52.der signed by CA52
certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1127190715 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3548: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED
chains.sh: Importing certificate CA53CA52.der to CA53DB database
certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der
chains.sh: #3549: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED
chains.sh: Creating DB EE5DB
certutil -N -d EE5DB -f EE5DB/dbpasswd
chains.sh: #3550: AnyPolicyWithLevel: Creating DB EE5DB - PASSED
chains.sh: Creating EE certifiate request EE5Req.der
certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE5Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3551: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED
chains.sh: Creating certficate EE5CA53.der signed by CA53
certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1127190716 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3552: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED
chains.sh: Importing certificate EE5CA53.der to EE5DB database
certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der
chains.sh: #3553: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED
chains.sh: Creating DB CA61DB
certutil -N -d CA61DB -f CA61DB/dbpasswd
chains.sh: #3554: AnyPolicyWithLevel: Creating DB CA61DB - PASSED
chains.sh: Creating Intermediate certifiate request CA61Req.der
certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA61Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3555: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED
chains.sh: Creating certficate CA61RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1127190717 --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
n
n
5
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3556: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED
chains.sh: Importing certificate CA61RootCA.der to CA61DB database
certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der
chains.sh: #3557: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED
chains.sh: Creating DB CA62DB
certutil -N -d CA62DB -f CA62DB/dbpasswd
chains.sh: #3558: AnyPolicyWithLevel: Creating DB CA62DB - PASSED
chains.sh: Creating Intermediate certifiate request CA62Req.der
certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA62Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3559: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED
chains.sh: Creating certficate CA62CA61.der signed by CA61
certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1127190718 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3560: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED
chains.sh: Importing certificate CA62CA61.der to CA62DB database
certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der
chains.sh: #3561: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED
chains.sh: Creating DB EE62DB
certutil -N -d EE62DB -f EE62DB/dbpasswd
chains.sh: #3562: AnyPolicyWithLevel: Creating DB EE62DB - PASSED
chains.sh: Creating EE certifiate request EE62Req.der
certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE62Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3563: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED
chains.sh: Creating certficate EE62CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1127190719 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3564: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED
chains.sh: Importing certificate EE62CA62.der to EE62DB database
certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der
chains.sh: #3565: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED
chains.sh: Creating DB CA63DB
certutil -N -d CA63DB -f CA63DB/dbpasswd
chains.sh: #3566: AnyPolicyWithLevel: Creating DB CA63DB - PASSED
chains.sh: Creating Intermediate certifiate request CA63Req.der
certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA63Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3567: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED
chains.sh: Creating certficate CA63CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1127190720 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3568: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED
chains.sh: Importing certificate CA63CA62.der to CA63DB database
certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der
chains.sh: #3569: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED
chains.sh: Creating DB EE63DB
certutil -N -d EE63DB -f EE63DB/dbpasswd
chains.sh: #3570: AnyPolicyWithLevel: Creating DB EE63DB - PASSED
chains.sh: Creating EE certifiate request EE63Req.der
certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE63Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3571: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED
chains.sh: Creating certficate EE63CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1127190721 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3572: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED
chains.sh: Importing certificate EE63CA63.der to EE63DB database
certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der
chains.sh: #3573: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED
chains.sh: Creating DB CA64DB
certutil -N -d CA64DB -f CA64DB/dbpasswd
chains.sh: #3574: AnyPolicyWithLevel: Creating DB CA64DB - PASSED
chains.sh: Creating Intermediate certifiate request CA64Req.der
certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA64Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3575: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED
chains.sh: Creating certficate CA64CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1127190722 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3576: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED
chains.sh: Importing certificate CA64CA63.der to CA64DB database
certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der
chains.sh: #3577: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED
chains.sh: Creating DB EE64DB
certutil -N -d EE64DB -f EE64DB/dbpasswd
chains.sh: #3578: AnyPolicyWithLevel: Creating DB EE64DB - PASSED
chains.sh: Creating EE certifiate request EE64Req.der
certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE64Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3579: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED
chains.sh: Creating certficate EE64CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1127190723 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3580: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED
chains.sh: Importing certificate EE64CA64.der to EE64DB database
certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der
chains.sh: #3581: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED
chains.sh: Creating DB CA65DB
certutil -N -d CA65DB -f CA65DB/dbpasswd
chains.sh: #3582: AnyPolicyWithLevel: Creating DB CA65DB - PASSED
chains.sh: Creating Intermediate certifiate request CA65Req.der
certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA65Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3583: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED
chains.sh: Creating certficate CA65CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1127190724 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3584: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED
chains.sh: Importing certificate CA65CA64.der to CA65DB database
certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der
chains.sh: #3585: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED
chains.sh: Creating DB EE65DB
certutil -N -d EE65DB -f EE65DB/dbpasswd
chains.sh: #3586: AnyPolicyWithLevel: Creating DB EE65DB - PASSED
chains.sh: Creating EE certifiate request EE65Req.der
certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE65Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3587: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED
chains.sh: Creating certficate EE65CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1127190725 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3588: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED
chains.sh: Importing certificate EE65CA65.der to EE65DB database
certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der
chains.sh: #3589: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED
chains.sh: Creating DB CA66DB
certutil -N -d CA66DB -f CA66DB/dbpasswd
chains.sh: #3590: AnyPolicyWithLevel: Creating DB CA66DB - PASSED
chains.sh: Creating Intermediate certifiate request CA66Req.der
certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA66Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3591: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED
chains.sh: Creating certficate CA66CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1127190726 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3592: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED
chains.sh: Importing certificate CA66CA65.der to CA66DB database
certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der
chains.sh: #3593: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED
chains.sh: Creating DB EE66DB
certutil -N -d EE66DB -f EE66DB/dbpasswd
chains.sh: #3594: AnyPolicyWithLevel: Creating DB EE66DB - PASSED
chains.sh: Creating EE certifiate request EE66Req.der
certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE66Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3595: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED
chains.sh: Creating certficate EE66CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1127190727 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3596: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED
chains.sh: Importing certificate EE66CA66.der to EE66DB database
certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der
chains.sh: #3597: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED
chains.sh: Creating DB CA67DB
certutil -N -d CA67DB -f CA67DB/dbpasswd
chains.sh: #3598: AnyPolicyWithLevel: Creating DB CA67DB - PASSED
chains.sh: Creating Intermediate certifiate request CA67Req.der
certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA67Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3599: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED
chains.sh: Creating certficate CA67CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1127190728 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3600: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED
chains.sh: Importing certificate CA67CA66.der to CA67DB database
certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der
chains.sh: #3601: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED
chains.sh: Creating DB EE67DB
certutil -N -d EE67DB -f EE67DB/dbpasswd
chains.sh: #3602: AnyPolicyWithLevel: Creating DB EE67DB - PASSED
chains.sh: Creating EE certifiate request EE67Req.der
certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE67Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3603: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED
chains.sh: Creating certficate EE67CA67.der signed by CA67
certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1127190729 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3604: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED
chains.sh: Importing certificate EE67CA67.der to EE67DB database
certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der
chains.sh: #3605: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3606: AnyPolicyWithLevel: Creating DB AllDB - PASSED
chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190700 (0x432f90ac)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
Validity:
Not Before: Wed Nov 28 00:07:16 2012
Not After : Tue Nov 28 00:07:16 2062
Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
Fingerprint (MD5):
8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
Fingerprint (SHA1):
48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D
Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3607: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3608: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190700 (0x432f90ac)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
Validity:
Not Before: Wed Nov 28 00:07:16 2012
Not After : Tue Nov 28 00:07:16 2062
Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
Fingerprint (MD5):
8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
Fingerprint (SHA1):
48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D
Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3609: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3610: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3611: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3612: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der
vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190700 (0x432f90ac)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
Validity:
Not Before: Wed Nov 28 00:07:16 2012
Not After : Tue Nov 28 00:07:16 2062
Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
Fingerprint (MD5):
8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
Fingerprint (SHA1):
48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D
Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US"
Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3613: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3614: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3615: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3616: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der
vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190700 (0x432f90ac)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
Validity:
Not Before: Wed Nov 28 00:07:16 2012
Not After : Tue Nov 28 00:07:16 2062
Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
Fingerprint (MD5):
8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
Fingerprint (SHA1):
48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D
Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US"
Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3617: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190700 (0x432f90ac)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
Validity:
Not Before: Wed Nov 28 00:07:16 2012
Not After : Tue Nov 28 00:07:16 2062
Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
Fingerprint (MD5):
8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
Fingerprint (SHA1):
48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D
Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3618: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3619: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190700 (0x432f90ac)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
Validity:
Not Before: Wed Nov 28 00:07:16 2012
Not After : Tue Nov 28 00:07:16 2062
Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
Fingerprint (MD5):
8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
Fingerprint (SHA1):
48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D
Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3620: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3621: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3622: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3623: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der
vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190700 (0x432f90ac)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
Validity:
Not Before: Wed Nov 28 00:07:16 2012
Not After : Tue Nov 28 00:07:16 2062
Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
Fingerprint (MD5):
8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
Fingerprint (SHA1):
48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D
Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US"
Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US"
Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3624: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190700 (0x432f90ac)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
Validity:
Not Before: Wed Nov 28 00:07:16 2012
Not After : Tue Nov 28 00:07:16 2062
Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
Fingerprint (MD5):
8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
Fingerprint (SHA1):
48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D
Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US"
Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3625: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190700 (0x432f90ac)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
Validity:
Not Before: Wed Nov 28 00:07:16 2012
Not After : Tue Nov 28 00:07:16 2062
Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
Fingerprint (MD5):
8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
Fingerprint (SHA1):
48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D
Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US"
Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3626: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190700 (0x432f90ac)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
Validity:
Not Before: Wed Nov 28 00:07:16 2012
Not After : Tue Nov 28 00:07:16 2062
Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
Fingerprint (MD5):
8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
Fingerprint (SHA1):
48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D
Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US"
Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3627: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190700 (0x432f90ac)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
Validity:
Not Before: Wed Nov 28 00:07:16 2012
Not After : Tue Nov 28 00:07:16 2062
Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
Fingerprint (MD5):
8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
Fingerprint (SHA1):
48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D
Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US"
Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3628: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190700 (0x432f90ac)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
Validity:
Not Before: Wed Nov 28 00:07:16 2012
Not After : Tue Nov 28 00:07:16 2062
Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
Fingerprint (MD5):
8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
Fingerprint (SHA1):
48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D
Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US"
Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US"
Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3629: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED
chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der
vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3630: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3631: explicitPolicy: Creating DB RootDB - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190730 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3632: explicitPolicy: Creating Root CA Root - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3633: explicitPolicy: Exporting Root CA Root.der - PASSED
chains.sh: Creating DB nonEVCADB
certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd
chains.sh: #3634: explicitPolicy: Creating DB nonEVCADB - PASSED
chains.sh: Creating Intermediate certifiate request nonEVCAReq.der
certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o nonEVCAReq.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3635: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED
chains.sh: Creating certficate nonEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1127190731 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3636: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED
chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database
certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der
chains.sh: #3637: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED
chains.sh: Creating DB EVCADB
certutil -N -d EVCADB -f EVCADB/dbpasswd
chains.sh: #3638: explicitPolicy: Creating DB EVCADB - PASSED
chains.sh: Creating Intermediate certifiate request EVCAReq.der
certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EVCAReq.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3639: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED
chains.sh: Creating certficate EVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1127190732 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3640: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED
chains.sh: Importing certificate EVCARoot.der to EVCADB database
certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der
chains.sh: #3641: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED
chains.sh: Creating DB otherEVCADB
certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd
chains.sh: #3642: explicitPolicy: Creating DB otherEVCADB - PASSED
chains.sh: Creating Intermediate certifiate request otherEVCAReq.der
certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o otherEVCAReq.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3643: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED
chains.sh: Creating certficate otherEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1127190733 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.2.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3644: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED
chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database
certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der
chains.sh: #3645: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED
chains.sh: Creating DB validEVDB
certutil -N -d validEVDB -f validEVDB/dbpasswd
chains.sh: #3646: explicitPolicy: Creating DB validEVDB - PASSED
chains.sh: Creating EE certifiate request validEVReq.der
certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o validEVReq.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3647: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED
chains.sh: Creating certficate validEVEVCA.der signed by EVCA
certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1127190734 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3648: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED
chains.sh: Importing certificate validEVEVCA.der to validEVDB database
certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der
chains.sh: #3649: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED
chains.sh: Creating DB invalidEVDB
certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd
chains.sh: #3650: explicitPolicy: Creating DB invalidEVDB - PASSED
chains.sh: Creating EE certifiate request invalidEVReq.der
certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o invalidEVReq.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3651: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED
chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA
certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1127190735 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3652: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED
chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database
certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der
chains.sh: #3653: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED
chains.sh: Creating DB wrongEVOIDDB
certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd
chains.sh: #3654: explicitPolicy: Creating DB wrongEVOIDDB - PASSED
chains.sh: Creating EE certifiate request wrongEVOIDReq.der
certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o wrongEVOIDReq.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3655: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED
chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA
certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1127190736 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3656: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED
chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database
certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der
chains.sh: #3657: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3658: explicitPolicy: Creating DB AllDB - PASSED
chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der
vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190730 (0x432f90ca)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:27 2012
Not After : Tue Nov 28 00:07:27 2062
Subject: "CN=Root ROOT CA,O=Root,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d5:1e:05:8c:7b:55:2c:43:36:d3:ee:f9:1b:4b:79:33:
52:e6:6e:a5:a7:0f:eb:cb:80:3c:d9:11:07:84:00:b6:
71:8a:f1:ae:d6:c0:a2:9d:4f:ad:51:ef:bd:03:89:eb:
e5:45:7a:78:0a:92:d1:bd:85:9e:ee:ce:3d:65:6b:55:
99:76:32:ef:5a:7b:4d:da:5f:06:83:e9:d1:d6:a3:b3:
5d:d3:c3:7f:aa:5d:79:e0:6d:ba:d8:be:68:b9:6d:a8:
a5:63:03:e4:32:be:d9:0f:53:bd:10:d7:26:81:b8:b5:
d2:75:05:b5:94:06:9c:3a:c4:2f:f2:59:b2:fb:98:b5
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
cb:a4:9f:42:a1:75:8f:58:0c:0e:6b:b6:d4:41:8a:ea:
22:40:a9:d7:61:a5:bd:90:76:09:e5:3f:41:32:06:41:
e8:e2:90:6e:fc:82:53:bc:62:71:61:ad:1b:3d:ab:e6:
72:87:05:d7:84:56:1b:24:c4:f2:7a:9e:45:99:87:ba:
c1:33:21:f7:6c:22:33:5f:eb:19:a6:c5:c5:93:b0:ce:
52:f7:76:69:0b:90:48:20:d1:1d:fa:c1:66:09:72:f0:
db:df:a5:9b:79:48:13:1b:2a:ef:cf:91:c4:c3:45:6e:
3d:58:04:ff:b1:65:89:ab:f8:9c:88:a3:94:39:72:f0
Fingerprint (MD5):
2E:ED:50:8E:D8:7A:D1:C3:18:E7:5A:72:E7:16:85:7D
Fingerprint (SHA1):
BD:28:D0:86:EF:5A:BD:CE:6F:08:0F:57:22:29:54:3D:86:9B:61:E9
Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #3659: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED
chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der
vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3660: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED
chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der
vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3661: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3662: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED
chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0
vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190730 (0x432f90ca)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:27 2012
Not After : Tue Nov 28 00:07:27 2062
Subject: "CN=Root ROOT CA,O=Root,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d5:1e:05:8c:7b:55:2c:43:36:d3:ee:f9:1b:4b:79:33:
52:e6:6e:a5:a7:0f:eb:cb:80:3c:d9:11:07:84:00:b6:
71:8a:f1:ae:d6:c0:a2:9d:4f:ad:51:ef:bd:03:89:eb:
e5:45:7a:78:0a:92:d1:bd:85:9e:ee:ce:3d:65:6b:55:
99:76:32:ef:5a:7b:4d:da:5f:06:83:e9:d1:d6:a3:b3:
5d:d3:c3:7f:aa:5d:79:e0:6d:ba:d8:be:68:b9:6d:a8:
a5:63:03:e4:32:be:d9:0f:53:bd:10:d7:26:81:b8:b5:
d2:75:05:b5:94:06:9c:3a:c4:2f:f2:59:b2:fb:98:b5
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
cb:a4:9f:42:a1:75:8f:58:0c:0e:6b:b6:d4:41:8a:ea:
22:40:a9:d7:61:a5:bd:90:76:09:e5:3f:41:32:06:41:
e8:e2:90:6e:fc:82:53:bc:62:71:61:ad:1b:3d:ab:e6:
72:87:05:d7:84:56:1b:24:c4:f2:7a:9e:45:99:87:ba:
c1:33:21:f7:6c:22:33:5f:eb:19:a6:c5:c5:93:b0:ce:
52:f7:76:69:0b:90:48:20:d1:1d:fa:c1:66:09:72:f0:
db:df:a5:9b:79:48:13:1b:2a:ef:cf:91:c4:c3:45:6e:
3d:58:04:ff:b1:65:89:ab:f8:9c:88:a3:94:39:72:f0
Fingerprint (MD5):
2E:ED:50:8E:D8:7A:D1:C3:18:E7:5A:72:E7:16:85:7D
Fingerprint (SHA1):
BD:28:D0:86:EF:5A:BD:CE:6F:08:0F:57:22:29:54:3D:86:9B:61:E9
Certificate Trust Flags:
SSL Flags:
Valid CA
Trusted CA
Email Flags:
Valid CA
Trusted CA
Object Signing Flags:
Valid CA
Trusted CA
Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #3663: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED
chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0
vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3664: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED
chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0
vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3665: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3666: Mapping: Creating DB RootDB - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190737 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3667: Mapping: Creating Root CA Root - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3668: Mapping: Exporting Root CA Root.der - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3669: Mapping: Creating DB CA1DB - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3670: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127190738 --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
OID.1.0
OID.1.1
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #3671: Mapping: Creating certficate CA1Root.der signed by Root - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3672: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3673: Mapping: Creating DB CA2DB - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3674: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127190739 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.1
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3675: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3676: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3677: Mapping: Creating DB UserDB - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o UserReq.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3678: Mapping: Creating EE certifiate request UserReq.der - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127190740 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.1
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3679: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #3680: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3681: Mapping: Creating DB AllDB - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3682: Mapping: Importing certificate Root.der to AllDB database - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3683: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3684: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED
chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root
vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190737 (0x432f90d1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:30 2012
Not After : Tue Nov 28 00:07:30 2062
Subject: "CN=Root ROOT CA,O=Root,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
aa:4f:a1:ba:26:ca:5f:f2:e2:f3:81:65:ab:2f:06:6a:
f4:51:fa:40:64:49:73:75:52:f1:7e:b7:e5:c2:f9:c2:
e3:fe:47:3c:07:7e:b7:5d:04:6f:24:46:e4:2f:23:ef:
ab:10:e8:a1:5d:6e:a9:4f:7c:3c:ee:28:a2:34:39:5c:
bc:54:20:03:33:64:a8:33:85:2d:0a:ec:ed:28:e1:73:
eb:ca:3a:cd:79:3e:ac:0d:87:cd:8f:4d:f7:ac:b5:ae:
24:7b:48:16:f0:1d:68:5c:4d:80:ea:74:39:6d:6a:59:
ff:1a:c0:96:fa:e3:be:2b:ce:d6:2d:f0:91:87:6d:d7
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
8b:49:a2:b7:50:fc:56:e5:e0:e6:3d:54:36:eb:3e:28:
4a:a4:f6:23:77:9b:a4:67:0e:07:66:d9:55:63:0b:d5:
75:f2:4a:06:a6:3c:ff:2b:f5:29:1f:4b:8c:3d:77:5d:
14:ac:4f:18:dc:50:2f:5d:dd:da:d2:01:0d:6b:d4:28:
f1:c6:a0:9e:87:43:c7:d8:bf:57:5a:f7:bc:39:5e:a4:
29:62:ec:45:82:08:ef:8a:00:cc:27:01:20:38:f0:41:
b1:4c:6e:4a:9b:40:71:ce:e7:40:06:30:12:af:10:71:
3d:ee:e0:c1:d1:fd:21:4d:51:ad:5b:6b:99:27:90:7d
Fingerprint (MD5):
76:27:92:50:FA:AC:64:D8:DC:96:16:64:8C:0C:AD:13
Fingerprint (SHA1):
F2:FF:8E:C3:BB:8D:52:06:59:83:9C:B3:A7:2F:72:E7:E4:E6:78:48
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3685: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED
chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root
vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3686: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root - PASSED
chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1
vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3687: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED
chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1
vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190738 (0x432f90d2)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:30 2012
Not After : Tue Nov 28 00:07:30 2017
Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b7:fd:40:86:0f:b7:12:b3:75:57:5d:db:f0:0a:e5:19:
f8:4f:58:be:8a:8d:76:0a:46:24:08:86:24:89:0f:51:
bb:ec:3f:65:3c:8f:59:95:6a:e2:cd:7b:c1:d8:cd:8c:
38:d4:46:65:43:7c:c0:e9:71:18:fb:43:8d:67:db:9b:
74:d4:44:55:32:1f:e9:6f:a2:3d:ce:a1:fb:e7:c3:bb:
9c:95:a6:8b:45:7f:c2:10:82:a9:56:3e:b3:b4:42:e9:
9c:52:fe:b9:c8:81:75:c3:eb:bb:4d:1e:3a:92:81:76:
47:f9:d5:b6:ad:16:a2:1f:2d:e2:ad:84:8f:18:87:71
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: Certificate Policy Mappings
Data: Sequence {
Sequence {
OID.1.0
User Defined Policy OID
}
}
Name: Certificate Policies
Data:
Policy Name: OID.1.0
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
21:64:05:b5:65:d5:49:1a:89:97:0a:dd:b0:41:4a:7a:
df:7a:38:49:f9:6b:55:c8:d1:f2:dd:56:88:52:78:b6:
3e:96:af:9a:2e:3a:42:e9:06:4d:e8:de:64:49:50:d7:
43:2b:11:62:28:a5:f1:4c:2b:93:90:62:02:05:a4:1d:
e6:9c:a6:a9:01:a1:a2:57:41:a5:7f:13:0e:16:37:5e:
4f:9d:1b:2f:5c:bb:3a:76:3f:d1:79:31:77:b2:e4:6d:
d0:be:b9:22:89:81:9b:6c:95:f2:26:6d:3c:d5:43:cf:
e0:97:a9:88:1a:80:29:29:ec:65:55:22:07:15:eb:49
Fingerprint (MD5):
BB:A2:9C:F0:D1:CB:D6:BC:06:B3:8A:7F:F4:32:DC:B1
Fingerprint (SHA1):
C1:96:56:7E:38:8B:E4:FF:C0:6F:0F:0F:B7:9B:06:6F:7D:FE:BB:49
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3688: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED
chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2
vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3689: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED
chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2
vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190739 (0x432f90d3)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
Validity:
Not Before: Wed Nov 28 00:07:31 2012
Not After : Tue Nov 28 00:07:31 2017
Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
ee:25:96:18:62:90:43:24:74:a0:9f:84:a9:d5:9c:90:
53:23:a5:e2:e8:55:ee:ed:ed:60:c3:2d:b9:8a:07:2f:
ad:d8:dd:2c:d6:d2:66:62:fc:94:ac:fb:b7:5e:c9:ad:
e3:0b:54:10:81:32:f8:41:d4:84:b5:37:c2:15:d8:9d:
d3:3e:16:a7:b3:c4:73:7d:c4:22:73:3b:1f:17:3e:bf:
52:5a:e6:c4:66:2c:44:a3:ad:3c:99:d4:8a:37:d8:81:
73:12:da:c9:dd:d1:dd:80:9a:06:7c:c7:fa:df:33:b8:
bd:8e:60:9f:23:31:1a:18:b5:28:d6:5b:f6:43:e1:e1
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: Certificate Policies
Data:
Policy Name: User Defined Policy OID
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
3f:65:9c:b9:9c:e8:a4:14:8e:d0:ba:27:8b:74:b8:a5:
0c:02:fc:3d:a1:e7:cf:83:2b:c8:6d:20:90:9f:9f:f3:
a8:17:2d:6d:7f:07:7a:4e:d3:d3:94:b5:9f:0c:a3:47:
c4:ca:a1:6d:19:ef:97:3e:60:ca:02:bc:2f:06:db:af:
01:2d:e6:a0:9f:2f:91:3f:3c:4f:c5:0a:ec:4e:fb:fe:
d6:ad:a9:49:92:ad:4d:54:4c:d1:20:35:8e:6a:bb:6c:
00:8a:be:d4:bc:d2:18:e7:07:58:93:ad:ae:df:28:e8:
41:a8:d3:1b:8d:b6:31:f5:1a:c2:53:fc:28:1d:37:84
Fingerprint (MD5):
A5:FD:F5:B6:B1:86:3D:66:50:68:3F:A3:6B:08:71:07
Fingerprint (SHA1):
75:AE:94:51:A6:CD:39:AE:28:F7:8B:C4:9B:BF:F0:51:58:EC:D3:80
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #3690: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3691: Mapping2: Creating DB RootDB - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190741 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3692: Mapping2: Creating Root CA Root - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3693: Mapping2: Exporting Root CA Root.der - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3694: Mapping2: Creating DB CA1DB - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3695: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127190742 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3696: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3697: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3698: Mapping2: Creating DB CA2DB - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3699: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127190743 --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
n
n
OID.1.0
OID.1.1
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #3700: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3701: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #3702: Mapping2: Creating DB CA3DB - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA3Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3703: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED
chains.sh: Creating certficate CA3CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1127190744 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.1
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3704: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED
chains.sh: Importing certificate CA3CA2.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der
chains.sh: #3705: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3706: Mapping2: Creating DB UserDB - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o UserReq.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3707: Mapping2: Creating EE certifiate request UserReq.der - PASSED
chains.sh: Creating certficate UserCA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1127190745 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.1
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3708: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED
chains.sh: Importing certificate UserCA3.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der
chains.sh: #3709: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3710: Mapping2: Creating DB AllDB - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3711: Mapping2: Importing certificate Root.der to AllDB database - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3712: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3713: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED
chains.sh: Importing certificate CA3CA2.der to AllDB database
certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der
chains.sh: #3714: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED
chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root
vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190741 (0x432f90d5)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:32 2012
Not After : Tue Nov 28 00:07:32 2062
Subject: "CN=Root ROOT CA,O=Root,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
ef:1f:6b:16:a1:1c:fd:5b:d4:00:9b:37:52:73:67:c3:
13:d9:51:93:67:4d:76:4a:9a:78:37:af:83:74:91:de:
e6:df:18:af:52:dd:08:d2:08:35:3b:d4:cc:21:4a:e6:
c9:c3:b1:17:f3:aa:3a:63:51:6f:63:c1:25:c5:72:ca:
03:05:e5:9f:c0:01:eb:e9:b6:b1:12:d2:0e:cb:7c:13:
3b:d8:e3:67:88:28:40:44:8f:3a:af:9e:36:3b:2d:21:
cb:ba:16:06:ce:ce:d1:76:fe:18:33:fb:e3:e6:bc:4a:
a2:ad:11:85:cb:be:fc:fd:df:27:1b:a3:34:55:fc:a7
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
d3:c9:9d:d0:1d:4a:1b:a5:5b:a4:22:89:63:81:f2:02:
55:fc:48:43:19:e4:5e:23:be:c1:4f:88:93:73:4a:2d:
d6:5b:84:09:c1:f4:fb:7a:ab:72:77:a4:c1:a6:13:46:
60:d0:b7:20:8e:26:58:b9:1b:81:79:26:2b:d0:ec:39:
94:58:d5:21:ca:f6:f1:d8:57:a7:6c:61:5f:4a:04:91:
83:77:1d:07:80:a5:ab:72:d2:3d:80:b1:99:f8:99:85:
20:00:53:84:2d:1d:a2:0e:fd:db:0a:52:6a:af:57:c7:
13:91:f5:58:84:fc:8c:6e:4e:f4:e0:74:9a:cf:13:c8
Fingerprint (MD5):
EB:73:5B:A6:C4:69:ED:E8:FE:3D:81:29:37:93:77:D3
Fingerprint (SHA1):
9D:7C:06:9E:14:87:FA:B5:78:1A:A3:97:A7:C5:5E:14:FF:BC:7F:20
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3715: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root - PASSED
chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root
vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. Root [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3716: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root - PASSED
chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1
vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190742 (0x432f90d6)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:07:32 2012
Not After : Tue Nov 28 00:07:32 2017
Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
bc:c2:b5:e3:f9:ed:b1:f5:b8:33:79:b9:a3:2a:e2:c5:
a5:ff:6d:8f:a3:4f:7c:8a:7d:88:a2:27:bd:fa:3d:8d:
e6:17:6d:f8:0a:d7:3d:7b:08:b4:9d:85:a4:88:67:63:
c3:21:f8:bf:76:61:7b:b7:11:4b:b4:77:9b:69:1d:08:
f3:2d:a6:c2:8a:47:e8:12:08:33:8f:0e:cb:36:ab:f8:
18:63:01:7e:92:96:9f:7f:fc:b3:35:fc:0a:f3:bd:1f:
c2:04:2c:38:39:43:10:4b:35:cf:c6:80:4c:61:36:c8:
fd:26:e2:52:c3:cb:78:fd:d6:35:9d:2e:bb:96:be:a3
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: Certificate Policies
Data:
Policy Name: User Defined Policy OID
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
e3:d3:f1:fc:76:62:b5:41:fd:67:b4:63:15:c1:74:29:
bb:51:bd:f5:0f:76:5d:7c:cd:a1:dc:48:74:26:ea:40:
1b:93:ef:26:89:e6:18:bd:d0:9f:87:3d:22:b0:07:f2:
fd:01:33:4f:f0:d3:9a:da:73:ab:e2:2a:54:7a:3f:5b:
1f:0e:f7:b2:08:71:f9:30:6f:de:eb:81:6b:ba:37:3b:
8a:03:5f:15:ce:50:14:08:17:1d:38:c4:31:e9:f1:e7:
36:c1:e4:ff:1e:65:d9:3d:0a:3a:08:76:b6:0b:25:fc:
a8:d4:23:16:e9:bb:64:dd:a1:ae:de:e8:fd:b9:c4:85
Fingerprint (MD5):
7E:D9:96:F1:6E:14:AC:7C:9F:E6:96:C6:57:1B:04:54
Fingerprint (SHA1):
1E:21:03:1E:37:2B:9C:A8:30:B0:76:8C:8D:C9:9B:12:73:97:9D:4E
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3717: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED
chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1
vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CA1 [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3718: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED
chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2
vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA2 [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3719: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED
chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2
vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190743 (0x432f90d7)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
Validity:
Not Before: Wed Nov 28 00:07:32 2012
Not After : Tue Nov 28 00:07:32 2017
Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
cf:39:c7:c9:8c:f3:61:23:59:1a:2f:0c:eb:11:ab:2d:
38:5f:25:b5:d3:41:e0:29:65:c9:c3:43:0b:ca:76:3a:
73:75:12:36:c3:cd:7a:97:1e:76:c8:60:5c:6e:1c:55:
25:e6:61:3e:34:02:77:55:27:8b:75:bc:ee:cb:c9:6a:
cf:0b:c9:3f:ce:6a:bf:18:6b:a5:f6:cb:e3:2b:74:d1:
c0:33:e7:64:c0:f9:cd:90:72:66:4f:44:8b:34:61:a0:
b1:bf:63:4e:e8:3a:8a:f5:e8:99:ec:ab:55:11:f1:18:
81:bb:b0:3b:40:b1:7f:b5:98:f0:f7:0e:ca:28:d2:33
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: Certificate Policy Mappings
Data: Sequence {
Sequence {
OID.1.0
User Defined Policy OID
}
}
Name: Certificate Policies
Data:
Policy Name: OID.1.0
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
0c:da:b8:ba:72:80:92:9b:fe:71:c5:5e:83:52:8c:c6:
f0:4a:79:98:3b:84:c5:07:f6:44:05:27:f2:04:9d:91:
b6:be:98:d1:03:4e:39:66:6c:f5:a7:0b:20:2e:54:eb:
29:39:81:a5:c8:75:d2:69:38:13:e2:b2:64:3d:a9:b5:
19:d8:2f:7b:ed:8e:51:d0:0f:62:2d:28:64:61:aa:6d:
fe:45:f0:64:00:dd:74:da:65:43:02:4a:2d:2d:4b:b4:
0c:87:29:e0:54:2a:73:cf:ec:27:a1:38:03:76:7b:9b:
f8:24:01:54:1a:23:3b:ea:f8:1b:0d:2d:6a:ba:cf:a3
Fingerprint (MD5):
A1:28:CC:F4:50:05:F7:F6:60:6C:C1:31:C9:48:2F:D6
Fingerprint (SHA1):
3F:A8:EB:5D:C9:30:69:60:52:8A:E4:6D:47:B5:56:8A:04:87:BA:56
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #3720: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3721: AIA: Creating DB RootDB - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190746 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3722: AIA: Creating Root CA Root - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3723: AIA: Exporting Root CA Root.der - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3724: AIA: Creating DB CA1DB - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3725: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127190747 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3726: AIA: Creating certficate CA1Root.der signed by Root - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3727: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3728: AIA: Creating DB CA2DB - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3729: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127190748 --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA1Root-1127190656.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice >
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3730: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3731: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3732: AIA: Creating DB UserDB - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o UserReq.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3733: AIA: Creating EE certifiate request UserReq.der - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127190749 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3734: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #3735: AIA: Importing certificate UserCA2.der to UserDB database - PASSED
chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der
vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
ERROR -8179: Peer's Certificate issuer is not recognized.
CN=CA1 Intermediate,O=CA1,C=US
Returned value is 1, expected result is fail
chains.sh: #3736: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der - PASSED
chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -f -t Root.der
vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #3737: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -f -t Root.der - FAILED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3738: BridgeWithAIA: Creating DB ArmyDB - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190750 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3739: BridgeWithAIA: Creating Root CA Army - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3740: BridgeWithAIA: Exporting Root CA Army.der - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3741: BridgeWithAIA: Creating DB NavyDB - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190751 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3742: BridgeWithAIA: Creating Root CA Navy - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3743: BridgeWithAIA: Exporting Root CA Navy.der - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3744: BridgeWithAIA: Creating DB BridgeDB - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o BridgeReq.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3745: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127190752 -7 Bridge@Army < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3746: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #3747: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127190753 -7 Bridge@Navy < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3748: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #3749: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #3750: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3751: BridgeWithAIA: Creating DB CA1DB - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3752: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127190754 --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-Bridge-1127190657.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice >
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3753: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #3754: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3755: BridgeWithAIA: Creating DB EE1DB - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3756: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127190755 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3757: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3758: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der
vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
ERROR -8179: Peer's Certificate issuer is not recognized.
CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3759: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Army.der
vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is fail
chains.sh: #3760: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Army.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Navy.der
vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #3761: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Navy.der - FAILED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der
vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
ERROR -8179: Peer's Certificate issuer is not recognized.
CN=Army ROOT CA,O=Army,C=US
ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #3762: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der - FAILED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3763: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190756 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3764: BridgeWithHalfAIA: Creating Root CA Army - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3765: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3766: BridgeWithHalfAIA: Creating DB NavyDB - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190757 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3767: BridgeWithHalfAIA: Creating Root CA Navy - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3768: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3769: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o BridgeReq.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3770: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127190758 -7 Bridge@Army < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3771: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #3772: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127190759 -7 Bridge@Navy < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3773: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #3774: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #3775: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3776: BridgeWithHalfAIA: Creating DB CA1DB - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3777: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127190760 --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-Bridge-1127190658.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice >
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3778: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #3779: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3780: BridgeWithHalfAIA: Creating DB EE1DB - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3781: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127190761 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3782: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3783: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3784: BridgeWithHalfAIA: Creating DB CA2DB - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3785: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1127190762 --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-BridgeNavy-1127190659.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice >
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3786: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #3787: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3788: BridgeWithHalfAIA: Creating DB EE2DB - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE2Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3789: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127190763 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3790: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #3791: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der
vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
ERROR -8179: Peer's Certificate issuer is not recognized.
CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3792: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Army.der
vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is fail
chains.sh: #3793: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Army.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Navy.der
vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #3794: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -f -t Navy.der - FAILED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der
vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
ERROR -8179: Peer's Certificate issuer is not recognized.
CN=Army ROOT CA,O=Army,C=US
ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #3795: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der - FAILED
chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -f -t Army.der
vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=EE2 EE,O=EE2,C=US :
ERROR -8179: Peer's Certificate issuer is not recognized.
CN=CA2 Intermediate,O=CA2,C=US
Returned value is 1, expected result is fail
chains.sh: #3796: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -f -t Army.der - PASSED
chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Army.der
vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190756 (0x432f90e4)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Army ROOT CA,O=Army,C=US"
Validity:
Not Before: Wed Nov 28 00:07:47 2012
Not After : Tue Nov 28 00:07:47 2062
Subject: "CN=Army ROOT CA,O=Army,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a8:3e:48:54:f1:33:0b:68:c9:d5:e9:a0:bf:fb:1c:0c:
14:8b:58:9a:eb:9c:ea:13:ba:ee:a1:94:80:a8:29:e3:
57:0a:91:7c:89:73:79:65:60:eb:c2:00:d6:41:5a:be:
b6:73:79:ca:a1:3b:26:63:58:40:09:31:cb:7a:92:07:
8f:fe:6c:c6:2b:07:68:a8:bc:d0:eb:2c:2e:90:5c:6f:
c8:5e:4a:a6:58:bb:e2:ec:6f:a0:b2:05:bd:9e:32:e5:
fc:8a:9d:43:4b:d1:9e:6b:2c:f8:14:ab:4e:5e:4f:3e:
22:09:ca:da:ea:4b:20:24:88:86:f5:6c:2f:d0:d0:55
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7a:3c:c7:c7:93:68:6e:d6:c8:67:3e:60:9b:4f:04:b9:
c1:b6:a1:12:6d:13:82:80:0d:d8:8f:24:2d:6d:86:fa:
4b:8a:ff:9b:cb:b7:ce:70:9f:39:4c:58:14:3c:fc:98:
1b:dc:ee:61:9b:66:9f:fb:0e:2d:d4:b8:a2:f3:66:bc:
10:3c:ae:da:98:74:d6:ea:66:c7:92:56:89:55:e0:41:
a8:87:23:7b:8c:53:59:57:df:10:c3:ad:d6:b3:05:3d:
3e:d5:71:97:54:fb:7d:9d:39:73:72:56:62:91:a9:8d:
58:4c:17:f5:4f:83:93:68:93:25:df:7b:20:e4:65:d6
Fingerprint (MD5):
A3:51:A1:41:BA:45:DF:BE:6F:24:B7:EA:4E:23:AB:BA
Fingerprint (SHA1):
5F:22:76:12:EB:8A:C1:CA:4E:A1:FB:C1:A5:C0:D4:28:F9:AA:87:CE
Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3797: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Army.der - PASSED
chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -f -t Navy.der
vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #3798: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -f -t Navy.der - FAILED
chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der
vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
ERROR -8179: Peer's Certificate issuer is not recognized.
CN=Army ROOT CA,O=Army,C=US
ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #3799: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -f -t Navy.der - FAILED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3800: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190764 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3801: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3802: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3803: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190765 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3804: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3805: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED
chains.sh: Creating DB CAArmyDB
certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd
chains.sh: #3806: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED
chains.sh: Creating Intermediate certifiate request CAArmyReq.der
certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CAArmyReq.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3807: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED
chains.sh: Creating certficate CAArmyArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1127190766 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
y
OID.1.1
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3808: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED
chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database
certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der
chains.sh: #3809: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED
chains.sh: Creating DB CANavyDB
certutil -N -d CANavyDB -f CANavyDB/dbpasswd
chains.sh: #3810: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED
chains.sh: Creating Intermediate certifiate request CANavyReq.der
certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CANavyReq.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3811: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED
chains.sh: Creating certficate CANavyNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1127190767 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.2.0
1
n
y
OID.2.1
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3812: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED
chains.sh: Importing certificate CANavyNavy.der to CANavyDB database
certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der
chains.sh: #3813: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3814: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o BridgeReq.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3815: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED
chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy
certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1127190768 -7 Bridge@CAArmy --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
y
OID.1.1
1
n
n
n
OID.1.1
OID.2.1
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #3816: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED
chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der
chains.sh: #3817: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED
chains.sh: Creating certficate BridgeCANavy.der signed by CANavy
certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1127190769 -7 Bridge@CANavy --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.2.0
1
n
y
OID.2.1
1
n
n
n
OID.2.1
OID.1.1
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #3818: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED
chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der
chains.sh: #3819: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7
chains.sh: #3820: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3821: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3822: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127190770 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.1
1
n
y
OID.2.1
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3823: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #3824: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3825: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3826: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1127190771 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1
n
y
OID.2.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3827: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #3828: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3829: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3830: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127190772 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.2.1
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3831: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3832: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3833: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE2Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3834: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127190773 --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.2.0
1
n
n
n
===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3835: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #3836: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der
vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3837: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der
vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190764 (0x432f90ec)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Army ROOT CA,O=Army,C=US"
Validity:
Not Before: Wed Nov 28 00:08:02 2012
Not After : Tue Nov 28 00:08:02 2062
Subject: "CN=Army ROOT CA,O=Army,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
9e:82:0d:1f:84:5d:52:ea:bf:19:34:4d:36:eb:59:29:
7a:f4:2e:af:03:fb:14:af:b4:be:c3:a4:c1:50:96:db:
b1:0a:d1:49:6f:e7:8f:ff:2f:0a:b7:a2:45:f0:38:7a:
37:6c:41:fd:39:46:af:85:66:d9:28:6b:f6:3c:b0:93:
db:44:8c:5a:b9:17:c5:ae:27:63:c6:2a:a5:81:6d:72:
44:f3:9a:7c:fa:89:e9:23:11:4e:30:7d:bb:7b:00:58:
72:8f:86:dd:f6:74:22:80:bb:18:e7:dc:56:b1:5f:e2:
27:fb:64:06:5b:c4:20:85:3f:f0:65:0f:9c:45:56:13
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
47:5a:42:46:d0:54:08:6e:90:20:af:82:99:c7:55:29:
b3:dc:11:92:6b:24:3f:13:65:d1:bc:5c:9b:cc:07:f7:
8a:51:ee:cf:f7:28:8a:87:d1:f6:16:e1:40:38:a6:28:
18:51:92:26:56:73:82:31:60:7e:4c:5b:0d:07:0d:82:
26:fc:d5:28:b9:81:e5:a5:a4:c5:a2:97:fc:13:65:08:
29:15:1e:e2:4a:3e:62:3a:20:ed:ba:1f:1e:ce:4d:1d:
ba:20:80:30:a5:33:a2:3a:eb:9e:5d:9a:68:97:6e:03:
39:4d:81:a7:f9:d9:c1:1d:c7:0b:5e:29:24:22:03:d0
Fingerprint (MD5):
45:E8:9D:FE:BB:D7:B2:AF:36:73:DF:BC:CC:8E:83:23
Fingerprint (SHA1):
2E:43:8D:7C:9A:BB:CD:19:B5:FD:1C:D0:DB:A4:BF:8F:E0:54:E1:C7
Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US"
Returned value is 0, expected result is pass
chains.sh: #3838: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der
vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3839: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der
vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3840: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der
vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3841: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der
vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3842: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der
vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3843: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der
vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3844: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED
chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der
vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3845: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED
chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der
vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3846: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED
chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der
vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190765 (0x432f90ed)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
Validity:
Not Before: Wed Nov 28 00:08:03 2012
Not After : Tue Nov 28 00:08:03 2062
Subject: "CN=Navy ROOT CA,O=Navy,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
bb:74:a1:35:54:a0:28:b4:cb:c2:1a:d6:d1:4b:cb:9b:
6d:fa:24:8c:3d:4b:17:89:83:bf:ef:e8:79:89:76:e2:
be:42:41:ba:c3:3a:bb:bb:1b:28:f7:d9:d5:d0:01:30:
f8:fa:c6:10:13:5f:1c:48:e1:00:9e:af:b4:5d:1f:e0:
16:4a:48:c8:b0:95:05:45:34:f3:af:2e:06:9b:1c:cc:
b0:99:5f:88:3c:3f:b4:53:30:e3:df:b6:ed:40:cc:12:
32:6d:6e:79:28:24:2f:f8:42:fa:1a:ab:17:70:9d:87:
25:81:6d:4b:2c:4c:45:b5:e0:7c:09:fd:aa:57:53:37
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
a1:ee:b8:f5:d6:aa:d6:39:19:16:4a:a0:0d:2b:10:8b:
22:ba:16:7f:ea:00:62:bf:64:dc:33:48:19:0d:51:34:
47:9b:82:f6:ae:75:46:72:b3:70:a6:e9:ed:de:4a:d7:
85:6d:99:69:22:36:5c:63:b3:92:04:7d:63:01:76:0e:
97:08:6f:fc:26:62:f5:58:93:36:b5:90:02:c7:de:11:
5f:eb:34:68:55:9d:2b:0e:ba:65:ed:9a:a9:71:3b:c2:
4b:7a:f0:c1:3d:8a:4f:d2:d1:e3:b8:81:a5:7b:b7:e0:
7f:11:c6:8d:82:9f:6d:ca:a7:28:6b:07:0d:b9:4c:25
Fingerprint (MD5):
58:46:F6:80:41:5B:63:89:E1:5D:B5:D7:3D:4A:6B:D1
Fingerprint (SHA1):
D0:55:D6:7E:18:16:7A:16:4B:78:90:32:DF:25:9A:2B:21:3B:92:D7
Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US"
Returned value is 0, expected result is pass
chains.sh: #3847: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED
chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der
vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3848: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED
chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der
vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3849: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED
chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der
vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3850: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED
chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der
vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3851: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED
chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der
vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3852: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3853: RealCerts: Creating DB AllDB - PASSED
chains.sh: Importing certificate TestCA.ca.cert to AllDB database
certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert
chains.sh: #3854: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED
chains.sh: Importing certificate TestUser50.cert to AllDB database
certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert
chains.sh: #3855: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED
chains.sh: Importing certificate TestUser51.cert to AllDB database
certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert
chains.sh: #3856: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED
chains.sh: Importing certificate PayPalRootCA.cert to AllDB database
certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert
chains.sh: #3857: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED
chains.sh: Importing certificate PayPalICA.cert to AllDB database
certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert
chains.sh: #3858: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED
chains.sh: Importing certificate PayPalEE.cert to AllDB database
certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert
chains.sh: #3859: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED
chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database
certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert
chains.sh: #3860: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED
chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB
vfychain -d AllDB -pp -vv /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Mar 19 21:04:25 2008
Not After : Tue Mar 19 21:04:25 2058
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
Fingerprint (MD5):
35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
Fingerprint (SHA1):
52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC
Certificate Trust Flags:
SSL Flags:
Valid CA
Trusted CA
Trusted Client CA
Email Flags:
Valid CA
Trusted CA
Object Signing Flags:
Valid CA
Trusted CA
Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo
untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #3861: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB - PASSED
chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB
vfychain -d AllDB -pp -vv /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Mar 19 21:04:25 2008
Not After : Tue Mar 19 21:04:25 2058
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
Fingerprint (MD5):
35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
Fingerprint (SHA1):
52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC
Certificate Trust Flags:
SSL Flags:
Valid CA
Trusted CA
Trusted Client CA
Email Flags:
Valid CA
Trusted CA
Object Signing Flags:
Valid CA
Trusted CA
Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo
untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #3862: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB - PASSED
chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6
vfychain -d AllDB -pp -vv -o OID.2.16.840.1.113733.1.7.23.6 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number:
58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig
n, Inc.",C=US"
Validity:
Not Before: Wed Nov 08 00:00:00 2006
Not After : Sun Nov 07 23:59:59 2021
Subject: "CN=VeriSign Class 3 Public Primary Certification Authority
- G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve
riSign Trust Network,O="VeriSign, Inc.",C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc:
7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64:
85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42:
b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec:
ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3:
62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b:
9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f:
e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db:
7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af:
1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a:
b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7:
ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74:
24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4:
8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95:
ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f:
73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: CRL Distribution Points
Distribution point:
URI: "http://crl.verisign.com/pca3.crl"
Name: Certificate Key Usage
Critical: True
Usages: Certificate Signing
CRL Signing
Name: OID.1.3.6.1.5.5.7.1.12
Data: Sequence {
[1]: {
[0]: {
Sequence {
Sequence {
Sequence {
"image/gif"
Sequence {
Sequence {
Sequence {
SHA-1
}
8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf:
80:6a:d4:48:18:2c:7b:19:2e
}
}
Sequence {
"http://logo.verisign.com/vslogo.gif"
}
}
}
}
}
}
}
Name: Certificate Policies
Data:
Policy Name: Certificate Policies AnyPolicy
Policy Qualifier Name: PKIX CPS Pointer Qualifier
Policy Qualifier Data: "https://www.verisign.com/cps"
Name: Certificate Subject Key ID
Data:
7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02:
af:33:31:33
Name: Certificate Authority Key Identifier
Issuer:
Directory Name: "OU=Class 3 Public Primary Certification Auth
ority,O="VeriSign, Inc.",C=US"
Serial Number:
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a:
f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31:
47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c:
d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0:
ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d:
5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a:
84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1:
d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6
Fingerprint (MD5):
C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C
Fingerprint (SHA1):
87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13
Certificate Trust Flags:
SSL Flags:
Valid CA
Trusted CA
Trusted Client CA
Email Flags:
Valid CA
Trusted CA
Object Signing Flags:
Valid CA
Trusted CA
Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc
.",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C=
US,serialNumber=3014267,businessCategory=Private Organization,incorporati
onState=Delaware,incorporationCountry=US"
Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter
ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network
,O="VeriSign, Inc.",C=US"
Returned value is 0, expected result is pass
chains.sh: #3863: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 - PASSED
chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB
vfychain -d AllDB -pp -vv /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. BrAirWaysBadSig :
ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is fail
chains.sh: #3864: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3865: DSA: Creating DB RootDB - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190774 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3866: DSA: Creating Root CA Root - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3867: DSA: Exporting Root CA Root.der - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3868: DSA: Creating DB CA1DB - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3869: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127190775 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3870: DSA: Creating certficate CA1Root.der signed by Root - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3871: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3872: DSA: Creating DB EE1DB - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3873: DSA: Creating EE certifiate request EE1Req.der - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127190776 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3874: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3875: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3876: DSA: Creating DB CA2DB - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3877: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED
chains.sh: Creating certficate CA2Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1127190777 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3878: DSA: Creating certficate CA2Root.der signed by Root - PASSED
chains.sh: Importing certificate CA2Root.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der
chains.sh: #3879: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3880: DSA: Creating DB EE2DB - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE2Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3881: DSA: Creating EE certifiate request EE2Req.der - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127190778 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3882: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #3883: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #3884: DSA: Creating DB CA3DB - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA3Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3885: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED
chains.sh: Creating certficate CA3Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1127190779 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3886: DSA: Creating certficate CA3Root.der signed by Root - PASSED
chains.sh: Importing certificate CA3Root.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der
chains.sh: #3887: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #3888: DSA: Creating DB EE3DB - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE3Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3889: DSA: Creating EE certifiate request EE3Req.der - PASSED
chains.sh: Creating certficate EE3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1127190780 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3890: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED
chains.sh: Importing certificate EE3CA3.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der
chains.sh: #3891: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED
chains.sh: Creating DB CA4DB
certutil -N -d CA4DB -f CA4DB/dbpasswd
chains.sh: #3892: DSA: Creating DB CA4DB - PASSED
chains.sh: Creating Intermediate certifiate request CA4Req.der
certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA4Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3893: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED
chains.sh: Creating certficate CA4Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1127190781 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3894: DSA: Creating certficate CA4Root.der signed by Root - PASSED
chains.sh: Importing certificate CA4Root.der to CA4DB database
certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der
chains.sh: #3895: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #3896: DSA: Creating DB EE4DB - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE4Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3897: DSA: Creating EE certifiate request EE4Req.der - PASSED
chains.sh: Creating certficate EE4CA4.der signed by CA4
certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1127190782 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3898: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED
chains.sh: Importing certificate EE4CA4.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der
chains.sh: #3899: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3900: DSA: Creating DB AllDB - PASSED
chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der
vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190774 (0x432f90f6)
Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:08:08 2012
Not After : Tue Nov 28 00:08:08 2062
Subject: "CN=Root ROOT CA,O=Root,C=US"
Subject Public Key Info:
Public Key Algorithm: ANSI X9.57 DSA Signature
Args:
30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
a5:10
DSA Public Key:
Prime:
98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
Subprime:
b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
76:27:03:81
Base:
04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
PublicValue:
71:5f:35:c8:dc:8b:c5:77:a9:17:a6:b9:61:c0:56:2c:
e7:3b:c5:ea:e7:09:12:1f:2b:fd:a4:63:92:87:c8:47:
23:b3:fa:e5:3e:ea:64:05:a8:5c:e5:3a:72:5c:2b:0b:
aa:6c:9b:ac:c3:b1:b1:1c:4b:75:ea:c2:87:6b:b2:81:
1c:7a:f3:94:42:ec:6e:06:34:b9:bd:dd:e4:64:ef:34:
76:3a:0c:87:07:74:56:44:9b:89:5a:74:b3:08:e0:91:
9e:df:7e:53:a8:52:67:87:ec:1b:66:20:2c:9f:b6:54:
46:3d:78:a1:91:e9:b7:27:41:4c:2e:01:32:a4:5d:c1
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
Signature:
30:2d:02:14:68:31:a9:95:ac:c1:65:8f:c8:33:c8:fb:
3d:30:4e:c5:0c:f4:38:cd:02:15:00:8b:e7:17:05:0b:
32:ba:84:b6:a0:f5:54:43:9b:23:dd:67:fb:eb:2c
Fingerprint (MD5):
9D:3C:4E:53:1A:0F:33:1A:D8:18:0A:6B:FE:A5:62:0B
Fingerprint (SHA1):
DC:98:50:D5:F3:FB:FA:53:A4:B0:52:1B:C7:39:8A:AD:C8:31:FB:F4
Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3901: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der - PASSED
chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der
vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190774 (0x432f90f6)
Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:08:08 2012
Not After : Tue Nov 28 00:08:08 2062
Subject: "CN=Root ROOT CA,O=Root,C=US"
Subject Public Key Info:
Public Key Algorithm: ANSI X9.57 DSA Signature
Args:
30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
a5:10
DSA Public Key:
Prime:
98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
Subprime:
b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
76:27:03:81
Base:
04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
PublicValue:
71:5f:35:c8:dc:8b:c5:77:a9:17:a6:b9:61:c0:56:2c:
e7:3b:c5:ea:e7:09:12:1f:2b:fd:a4:63:92:87:c8:47:
23:b3:fa:e5:3e:ea:64:05:a8:5c:e5:3a:72:5c:2b:0b:
aa:6c:9b:ac:c3:b1:b1:1c:4b:75:ea:c2:87:6b:b2:81:
1c:7a:f3:94:42:ec:6e:06:34:b9:bd:dd:e4:64:ef:34:
76:3a:0c:87:07:74:56:44:9b:89:5a:74:b3:08:e0:91:
9e:df:7e:53:a8:52:67:87:ec:1b:66:20:2c:9f:b6:54:
46:3d:78:a1:91:e9:b7:27:41:4c:2e:01:32:a4:5d:c1
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
Signature:
30:2d:02:14:68:31:a9:95:ac:c1:65:8f:c8:33:c8:fb:
3d:30:4e:c5:0c:f4:38:cd:02:15:00:8b:e7:17:05:0b:
32:ba:84:b6:a0:f5:54:43:9b:23:dd:67:fb:eb:2c
Fingerprint (MD5):
9D:3C:4E:53:1A:0F:33:1A:D8:18:0A:6B:FE:A5:62:0B
Fingerprint (SHA1):
DC:98:50:D5:F3:FB:FA:53:A4:B0:52:1B:C7:39:8A:AD:C8:31:FB:F4
Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3902: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der - PASSED
chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der
vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190774 (0x432f90f6)
Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:08:08 2012
Not After : Tue Nov 28 00:08:08 2062
Subject: "CN=Root ROOT CA,O=Root,C=US"
Subject Public Key Info:
Public Key Algorithm: ANSI X9.57 DSA Signature
Args:
30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
a5:10
DSA Public Key:
Prime:
98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
Subprime:
b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
76:27:03:81
Base:
04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
PublicValue:
71:5f:35:c8:dc:8b:c5:77:a9:17:a6:b9:61:c0:56:2c:
e7:3b:c5:ea:e7:09:12:1f:2b:fd:a4:63:92:87:c8:47:
23:b3:fa:e5:3e:ea:64:05:a8:5c:e5:3a:72:5c:2b:0b:
aa:6c:9b:ac:c3:b1:b1:1c:4b:75:ea:c2:87:6b:b2:81:
1c:7a:f3:94:42:ec:6e:06:34:b9:bd:dd:e4:64:ef:34:
76:3a:0c:87:07:74:56:44:9b:89:5a:74:b3:08:e0:91:
9e:df:7e:53:a8:52:67:87:ec:1b:66:20:2c:9f:b6:54:
46:3d:78:a1:91:e9:b7:27:41:4c:2e:01:32:a4:5d:c1
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
Signature:
30:2d:02:14:68:31:a9:95:ac:c1:65:8f:c8:33:c8:fb:
3d:30:4e:c5:0c:f4:38:cd:02:15:00:8b:e7:17:05:0b:
32:ba:84:b6:a0:f5:54:43:9b:23:dd:67:fb:eb:2c
Fingerprint (MD5):
9D:3C:4E:53:1A:0F:33:1A:D8:18:0A:6B:FE:A5:62:0B
Fingerprint (SHA1):
DC:98:50:D5:F3:FB:FA:53:A4:B0:52:1B:C7:39:8A:AD:C8:31:FB:F4
Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #3903: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der - PASSED
chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der
vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1127190774 (0x432f90f6)
Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:08:08 2012
Not After : Tue Nov 28 00:08:08 2062
Subject: "CN=Root ROOT CA,O=Root,C=US"
Subject Public Key Info:
Public Key Algorithm: ANSI X9.57 DSA Signature
Args:
30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
a5:10
DSA Public Key:
Prime:
98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
Subprime:
b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
76:27:03:81
Base:
04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
PublicValue:
71:5f:35:c8:dc:8b:c5:77:a9:17:a6:b9:61:c0:56:2c:
e7:3b:c5:ea:e7:09:12:1f:2b:fd:a4:63:92:87:c8:47:
23:b3:fa:e5:3e:ea:64:05:a8:5c:e5:3a:72:5c:2b:0b:
aa:6c:9b:ac:c3:b1:b1:1c:4b:75:ea:c2:87:6b:b2:81:
1c:7a:f3:94:42:ec:6e:06:34:b9:bd:dd:e4:64:ef:34:
76:3a:0c:87:07:74:56:44:9b:89:5a:74:b3:08:e0:91:
9e:df:7e:53:a8:52:67:87:ec:1b:66:20:2c:9f:b6:54:
46:3d:78:a1:91:e9:b7:27:41:4c:2e:01:32:a4:5d:c1
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
Signature:
30:2d:02:14:68:31:a9:95:ac:c1:65:8f:c8:33:c8:fb:
3d:30:4e:c5:0c:f4:38:cd:02:15:00:8b:e7:17:05:0b:
32:ba:84:b6:a0:f5:54:43:9b:23:dd:67:fb:eb:2c
Fingerprint (MD5):
9D:3C:4E:53:1A:0F:33:1A:D8:18:0A:6B:FE:A5:62:0B
Fingerprint (SHA1):
DC:98:50:D5:F3:FB:FA:53:A4:B0:52:1B:C7:39:8A:AD:C8:31:FB:F4
Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US"
Returned value is 0, expected result is pass
chains.sh: #3904: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3905: Revocation: Creating DB RootDB - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 10 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3906: Revocation: Creating Root CA Root - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3907: Revocation: Exporting Root CA Root.der - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #3908: Revocation: Creating DB CA0DB - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA0Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3909: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3910: Revocation: Creating certficate CA0Root.der signed by Root - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #3911: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3912: Revocation: Creating DB CA1DB - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3913: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3914: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #3915: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #3916: Revocation: Creating DB EE11DB - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE11Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3917: Revocation: Creating EE certifiate request EE11Req.der - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3918: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #3919: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED
chains.sh: Creating DB EE12DB
certutil -N -d EE12DB -f EE12DB/dbpasswd
chains.sh: #3920: Revocation: Creating DB EE12DB - PASSED
chains.sh: Creating EE certifiate request EE12Req.der
certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE12Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3921: Revocation: Creating EE certifiate request EE12Req.der - PASSED
chains.sh: Creating certficate EE12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3922: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate EE12CA1.der to EE12DB database
certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der
chains.sh: #3923: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3924: Revocation: Creating DB CA2DB - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3925: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3926: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #3927: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #3928: Revocation: Creating DB EE21DB - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE21Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3929: Revocation: Creating EE certifiate request EE21Req.der - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3930: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #3931: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128000813Z
nextupdate=20131128000813Z
===
CRL Info:
:
Version: 2 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
This Update: Wed Nov 28 00:08:13 2012
Next Update: Thu Nov 28 00:08:13 2013
CRL Extensions:
chains.sh: #3932: Revocation: Create CRL for RootDB - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128000813Z
nextupdate=20131128000813Z
===
CRL Info:
:
Version: 2 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
This Update: Wed Nov 28 00:08:13 2012
Next Update: Thu Nov 28 00:08:13 2013
CRL Extensions:
chains.sh: #3933: Revocation: Create CRL for CA0DB - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128000813Z
nextupdate=20131128000813Z
===
CRL Info:
:
Version: 2 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
This Update: Wed Nov 28 00:08:13 2012
Next Update: Thu Nov 28 00:08:13 2013
CRL Extensions:
chains.sh: #3934: Revocation: Create CRL for CA1DB - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128000813Z
nextupdate=20131128000813Z
===
CRL Info:
:
Version: 2 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
This Update: Wed Nov 28 00:08:13 2012
Next Update: Thu Nov 28 00:08:13 2013
CRL Extensions:
chains.sh: #3935: Revocation: Create CRL for CA2DB - PASSED
chains.sh: Revoking certificate with SN 14 issued by CA1
crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128000814Z
addcert 14 20121128000814Z
===
CRL Info:
:
Version: 2 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
This Update: Wed Nov 28 00:08:14 2012
Next Update: Thu Nov 28 00:08:13 2013
Entry 1 (0x1):
Serial Number: 14 (0xe)
Revocation Date: Wed Nov 28 00:08:14 2012
CRL Extensions:
chains.sh: #3936: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED
chains.sh: Revoking certificate with SN 15 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128000815Z
addcert 15 20121128000815Z
===
CRL Info:
:
Version: 2 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
This Update: Wed Nov 28 00:08:15 2012
Next Update: Thu Nov 28 00:08:13 2013
Entry 1 (0x1):
Serial Number: 15 (0xf)
Revocation Date: Wed Nov 28 00:08:15 2012
CRL Extensions:
chains.sh: #3937: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3938: Revocation: Creating DB AllDB - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3939: Revocation: Importing certificate Root.der to AllDB database - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #3940: Revocation: Importing CRL Root.crl to AllDB database - PASSED
chains.sh: Importing certificate CA0Root.der to AllDB database
certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der
chains.sh: #3941: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED
chains.sh: Importing CRL CA0.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl
chains.sh: #3942: Revocation: Importing CRL CA0.crl to AllDB database - PASSED
chains.sh: Importing certificate CA1CA0.der to AllDB database
certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der
chains.sh: #3943: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED
chains.sh: Importing CRL CA1.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl
chains.sh: #3944: Revocation: Importing CRL CA1.crl to AllDB database - PASSED
chains.sh: Importing certificate CA2CA0.der to AllDB database
certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der
chains.sh: #3945: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED
chains.sh: Importing CRL CA2.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl
chains.sh: #3946: Revocation: Importing CRL CA2.crl to AllDB database - PASSED
chains.sh: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der
vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 10 (0xa)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:08:11 2012
Not After : Tue Nov 28 00:08:11 2062
Subject: "CN=Root ROOT CA,O=Root,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
ba:81:42:ec:c9:6b:19:43:9d:82:4e:7d:bc:8a:44:f4:
09:42:c5:a0:0b:16:35:cc:ab:64:01:a8:c5:4e:e4:76:
76:56:b9:e4:27:40:06:97:44:8c:8b:65:b9:e9:16:23:
21:01:40:ac:ab:5d:41:55:40:95:b7:ba:e7:2d:ea:8b:
81:68:e0:e0:07:60:5d:b3:46:f9:12:41:9b:70:06:7c:
af:78:51:f2:45:17:f7:ef:a3:4e:b3:13:eb:51:5d:d2:
74:6b:ab:40:2f:16:87:12:f7:d8:6c:d8:6b:85:d6:9e:
16:0b:06:5f:73:ad:90:3c:d5:e5:75:d3:be:ca:1d:7d
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
5d:82:a6:72:22:5a:6a:58:63:d1:ed:19:3f:d1:0d:70:
12:64:40:d3:7a:cc:3d:61:ab:5c:54:29:96:01:d8:34:
1e:44:fa:04:c7:b2:4a:3c:11:99:b5:f4:89:d5:48:79:
0c:65:b0:dd:46:95:25:3a:62:75:c2:a3:91:87:02:29:
db:83:df:91:34:32:42:91:73:d9:73:41:16:6f:52:4e:
ed:bf:eb:7f:12:ef:ce:b7:a1:6f:aa:73:3e:d4:dc:c4:
db:6b:40:1a:76:43:5c:a6:a2:1f:be:24:0d:95:ea:4d:
a0:69:e6:0b:d9:7f:f7:7f:c4:4c:d9:f8:70:9e:3b:aa
Fingerprint (MD5):
E2:A0:FB:6F:07:16:11:B2:CD:EA:9C:EA:BF:76:AB:00
Fingerprint (SHA1):
AA:C8:14:D3:E8:52:43:A1:4F:63:57:22:F8:46:FA:E9:5A:64:8F:18
Certificate Trust Flags:
SSL Flags:
Valid CA
Trusted CA
Trusted Client CA
Email Flags:
Valid CA
Trusted CA
Object Signing Flags:
Valid CA
Trusted CA
Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #3947: Revocation: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED
chains.sh: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der
vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3948: Revocation: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED
chains.sh: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der
vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 10 (0xa)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
Validity:
Not Before: Wed Nov 28 00:08:11 2012
Not After : Tue Nov 28 00:08:11 2062
Subject: "CN=Root ROOT CA,O=Root,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
ba:81:42:ec:c9:6b:19:43:9d:82:4e:7d:bc:8a:44:f4:
09:42:c5:a0:0b:16:35:cc:ab:64:01:a8:c5:4e:e4:76:
76:56:b9:e4:27:40:06:97:44:8c:8b:65:b9:e9:16:23:
21:01:40:ac:ab:5d:41:55:40:95:b7:ba:e7:2d:ea:8b:
81:68:e0:e0:07:60:5d:b3:46:f9:12:41:9b:70:06:7c:
af:78:51:f2:45:17:f7:ef:a3:4e:b3:13:eb:51:5d:d2:
74:6b:ab:40:2f:16:87:12:f7:d8:6c:d8:6b:85:d6:9e:
16:0b:06:5f:73:ad:90:3c:d5:e5:75:d3:be:ca:1d:7d
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
5d:82:a6:72:22:5a:6a:58:63:d1:ed:19:3f:d1:0d:70:
12:64:40:d3:7a:cc:3d:61:ab:5c:54:29:96:01:d8:34:
1e:44:fa:04:c7:b2:4a:3c:11:99:b5:f4:89:d5:48:79:
0c:65:b0:dd:46:95:25:3a:62:75:c2:a3:91:87:02:29:
db:83:df:91:34:32:42:91:73:d9:73:41:16:6f:52:4e:
ed:bf:eb:7f:12:ef:ce:b7:a1:6f:aa:73:3e:d4:dc:c4:
db:6b:40:1a:76:43:5c:a6:a2:1f:be:24:0d:95:ea:4d:
a0:69:e6:0b:d9:7f:f7:7f:c4:4c:d9:f8:70:9e:3b:aa
Fingerprint (MD5):
E2:A0:FB:6F:07:16:11:B2:CD:EA:9C:EA:BF:76:AB:00
Fingerprint (SHA1):
AA:C8:14:D3:E8:52:43:A1:4F:63:57:22:F8:46:FA:E9:5A:64:8F:18
Certificate Trust Flags:
SSL Flags:
Valid CA
Trusted CA
Trusted Client CA
Email Flags:
Valid CA
Trusted CA
Object Signing Flags:
Valid CA
Trusted CA
Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #3949: Revocation: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED
chains.sh: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der
vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3950: Revocation: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED
chains.sh: #3951: Test that OCSP server is reachable - PASSED
chains.sh: Creating DB OCSPRootDB
certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd
chains.sh: #3952: OCSP: Creating DB OCSPRootDB - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRootDB database
certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #3953: OCSP: Importing certificate OCSPRoot.cert to OCSPRootDB database - PASSED
chains.sh: Creating DB OCSPCA1DB
certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd
chains.sh: #3954: OCSP: Creating DB OCSPCA1DB - PASSED
chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin/pk12util -d OCSPCA1DB -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #3955: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database - PASSED
chains.sh: Create CRL for OCSPCA1DB
crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128000816Z
nextupdate=20131128000816Z
===
CRL Info:
:
Version: 2 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
This Update: Wed Nov 28 00:08:16 2012
Next Update: Thu Nov 28 00:08:16 2013
CRL Extensions:
chains.sh: #3956: OCSP: Create CRL for OCSPCA1DB - PASSED
chains.sh: Revoking certificate with SN 3 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128000817Z
addcert 3 20121128000817Z
===
CRL Info:
:
Version: 2 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
This Update: Wed Nov 28 00:08:17 2012
Next Update: Thu Nov 28 00:08:16 2013
Entry 1 (0x1):
Serial Number: 3 (0x3)
Revocation Date: Wed Nov 28 00:08:17 2012
CRL Extensions:
chains.sh: #3957: OCSP: Revoking certificate with SN 3 issued by OCSPCA1 - PASSED
chains.sh: Revoking certificate with SN 4 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128000818Z
addcert 4 20121128000818Z
===
CRL Info:
:
Version: 2 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
This Update: Wed Nov 28 00:08:18 2012
Next Update: Thu Nov 28 00:08:16 2013
Entry 1 (0x1):
Serial Number: 4 (0x4)
Revocation Date: Wed Nov 28 00:08:18 2012
Entry 2 (0x2):
Serial Number: 3 (0x3)
Revocation Date: Wed Nov 28 00:08:17 2012
CRL Extensions:
chains.sh: #3958: OCSP: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED
chains.sh: Verifying certificate(s) OCSPEE11.cert OCSPCA1.cert with flags -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE11.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert -t OCSPRoot
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 403173846 (0x1807f1d6)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
Validity:
Not Before: Tue Apr 03 15:38:45 2012
Not After : Mon Apr 03 15:38:45 2062
Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
Fingerprint (MD5):
B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
Fingerprint (SHA1):
35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99
Certificate Trust Flags:
SSL Flags:
Valid CA
Trusted CA
Trusted Client CA
Email Flags:
Valid CA
Trusted CA
Object Signing Flags:
Valid CA
Trusted CA
Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3959: OCSP: Verifying certificate(s) OCSPEE11.cert OCSPCA1.cert with flags -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s) OCSPEE12.cert OCSPCA1.cert with flags -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3960: OCSP: Verifying certificate(s) OCSPEE12.cert OCSPCA1.cert with flags -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s) OCSPEE15.cert OCSPCA1.cert with flags -g leaf -m ocsp -d OCSPRootDB -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert -t OCSPRoot
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 403173846 (0x1807f1d6)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
Validity:
Not Before: Tue Apr 03 15:38:45 2012
Not After : Mon Apr 03 15:38:45 2062
Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
Fingerprint (MD5):
B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
Fingerprint (SHA1):
35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99
Certificate Trust Flags:
SSL Flags:
Valid CA
Trusted CA
Trusted Client CA
Email Flags:
Valid CA
Trusted CA
Object Signing Flags:
Valid CA
Trusted CA
Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3961: OCSP: Verifying certificate(s) OCSPEE15.cert OCSPCA1.cert with flags -g leaf -m ocsp -d OCSPRootDB -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s) OCSPEE15.cert OCSPCA1.cert with flags -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3962: OCSP: Verifying certificate(s) OCSPEE15.cert OCSPCA1.cert with flags -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s) OCSPEE21.cert OCSPCA2.cert with flags -g leaf -m ocsp -d OCSPRootDB -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert -t OCSPRoot
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 403173846 (0x1807f1d6)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
Validity:
Not Before: Tue Apr 03 15:38:45 2012
Not After : Mon Apr 03 15:38:45 2062
Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
Fingerprint (MD5):
B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
Fingerprint (SHA1):
35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99
Certificate Trust Flags:
SSL Flags:
Valid CA
Trusted CA
Trusted Client CA
Email Flags:
Valid CA
Trusted CA
Object Signing Flags:
Valid CA
Trusted CA
Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3963: OCSP: Verifying certificate(s) OCSPEE21.cert OCSPCA2.cert with flags -g leaf -m ocsp -d OCSPRootDB -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s) OCSPEE21.cert OCSPCA2.cert with flags -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3964: OCSP: Verifying certificate(s) OCSPEE21.cert OCSPCA2.cert with flags -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s) OCSPEE21.cert OCSPCA2.cert with flags -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv -g chain -h requireFreshInfo -m ocsp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3965: OCSP: Verifying certificate(s) OCSPEE21.cert OCSPCA2.cert with flags -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s) OCSPEE31.cert OCSPCA3.cert with flags -g leaf -m ocsp -d OCSPRootDB -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert -t OCSPRoot
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 403173846 (0x1807f1d6)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
Validity:
Not Before: Tue Apr 03 15:38:45 2012
Not After : Mon Apr 03 15:38:45 2062
Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
Fingerprint (MD5):
B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
Fingerprint (SHA1):
35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99
Certificate Trust Flags:
SSL Flags:
Valid CA
Trusted CA
Trusted Client CA
Email Flags:
Valid CA
Trusted CA
Object Signing Flags:
Valid CA
Trusted CA
Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US"
Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #3966: OCSP: Verifying certificate(s) OCSPEE31.cert OCSPCA3.cert with flags -g leaf -m ocsp -d OCSPRootDB -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s) OCSPEE31.cert OCSPCA3.cert with flags -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3967: OCSP: Verifying certificate(s) OCSPEE31.cert OCSPCA3.cert with flags -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s) OCSPEE12.cert OCSPCA1.cert with flags -g leaf -m ocsp -s doNotUse -d OCSPRootDB -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s doNotUse /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert -t OCSPRoot
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 403173846 (0x1807f1d6)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
Validity:
Not Before: Tue Apr 03 15:38:45 2012
Not After : Mon Apr 03 15:38:45 2062
Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
Fingerprint (MD5):
B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
Fingerprint (SHA1):
35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99
Certificate Trust Flags:
SSL Flags:
Valid CA
Trusted CA
Trusted Client CA
Email Flags:
Valid CA
Trusted CA
Object Signing Flags:
Valid CA
Trusted CA
Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3968: OCSP: Verifying certificate(s) OCSPEE12.cert OCSPCA1.cert with flags -g leaf -m ocsp -s doNotUse -d OCSPRootDB -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s) OCSPEE12.cert OCSPCA1.cert with flags -g leaf -m ocsp -s forbidFetching -d OCSPRootDB -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s forbidFetching /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert -t OCSPRoot
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 403173846 (0x1807f1d6)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
Validity:
Not Before: Tue Apr 03 15:38:45 2012
Not After : Mon Apr 03 15:38:45 2062
Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
Fingerprint (MD5):
B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
Fingerprint (SHA1):
35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99
Certificate Trust Flags:
SSL Flags:
Valid CA
Trusted CA
Trusted Client CA
Email Flags:
Valid CA
Trusted CA
Object Signing Flags:
Valid CA
Trusted CA
Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3969: OCSP: Verifying certificate(s) OCSPEE12.cert OCSPCA1.cert with flags -g leaf -m ocsp -s forbidFetching -d OCSPRootDB -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s) OCSPEE15.cert OCSPCA1.cert with flags -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
ERROR -8071: The OCSP server experienced an internal error.
Returned value is 1, expected result is fail
chains.sh: #3970: OCSP: Verifying certificate(s) OCSPEE15.cert OCSPCA1.cert with flags -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s) OCSPEE21.cert OCSPCA2.cert with flags -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3971: OCSP: Verifying certificate(s) OCSPEE21.cert OCSPCA2.cert with flags -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s) OCSPEE13.cert OCSPCA1.cert with flags -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB -t OCSPCA1
vfychain -d OCSPCA1DB -pp -vv -g leaf -h testLocalInfoFirst -m ocsp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE13.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert -t OCSPCA1
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
Validity:
Not Before: Tue Apr 03 15:38:46 2012
Not After : Mon Apr 03 15:38:46 2017
Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
c1:b0:47:12:51:37:68:7d:39:cb:ee:e3:32:2c:ad:b5:
44:2c:72:7f:c8:e9:32:79:d9:7d:b9:69:94:bc:5a:9e:
5a:3b:0f:e2:07:e5:b2:76:04:73:32:ee:92:8d:a1:2f:
ed:e4:e0:5a:92:28:ca:bb:48:fc:5c:44:dc:9a:c0:3b:
88:84:0a:bd:6b:4a:c9:18:37:51:e3:a3:3a:e0:40:5c:
53:0d:04:ed:c7:18:34:25:5a:5e:00:f5:0d:29:ef:fa:
69:e3:6d:96:e3:1e:5b:8a:4e:3e:77:e7:45:16:81:6f:
21:01:2c:8d:b1:fa:57:06:f0:9b:95:1a:c3:0d:25:25
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is a CA with no maximum path length.
Name: Authority Information Access
Method: PKIX Online Certificate Status Protocol
Location:
URI: "http://ocsp.kuix.de:2600"
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
88:c4:da:b7:3d:84:1d:1c:ca:f8:c1:2e:46:59:c2:33:
93:64:38:f9:2a:87:32:ca:ec:e0:ef:ff:cc:1f:9d:96:
a6:42:b0:cd:8f:b3:85:3a:59:64:34:c1:0d:bb:24:c5:
36:f6:28:93:a0:3b:58:b8:93:87:c5:6e:f2:64:23:b9:
c4:a9:53:82:bd:0a:12:92:58:90:01:b1:11:a6:65:aa:
a9:72:94:60:96:38:fd:e3:9e:14:5b:4e:ed:0d:99:e2:
94:6a:50:84:88:00:1e:14:a7:ed:20:69:95:9b:cb:b7:
61:11:b8:14:7a:1e:19:3c:bb:38:5b:97:e0:ad:9f:2e
Fingerprint (MD5):
6E:22:37:7A:94:F2:07:60:87:6B:9D:CF:64:C9:D9:37
Fingerprint (SHA1):
92:63:FD:E1:AA:A4:45:54:F7:E8:B7:5F:92:8F:74:06:3E:96:BA:47
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3972: OCSP: Verifying certificate(s) OCSPEE13.cert OCSPCA1.cert with flags -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB -t OCSPCA1 - PASSED
chains.sh: Creating DB OCSPRoot1DB
certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd
chains.sh: #3973: OCSP: Creating DB OCSPRoot1DB - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot1DB database
certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #3974: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot1DB database - PASSED
chains.sh: Verifying certificate(s) OCSPEE23.cert OCSPCA2.cert with flags -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB -t OCSPRoot
vfychain -d OCSPRoot1DB -pp -vv -g chain -m ocsp -g leaf -m ocsp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3975: OCSP: Verifying certificate(s) OCSPEE23.cert OCSPCA2.cert with flags -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB -t OCSPRoot - PASSED
chains.sh: Creating DB OCSPRoot2DB
certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd
chains.sh: #3976: OCSP: Creating DB OCSPRoot2DB - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot2DB database
certutil -A -n OCSPRoot -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #3977: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot2DB database - PASSED
chains.sh: Verifying certificate(s) OCSPEE23.cert OCSPCA2.cert with flags -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB -t OCSPRoot
vfychain -d OCSPRoot2DB -pp -vv -g chain -m ocsp -g leaf -m ocsp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert -t OCSPRoot
Chain is good!
Root Certificate:
Data:
Version: 3 (0x2)
Serial Number: 403173846 (0x1807f1d6)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
Validity:
Not Before: Tue Apr 03 15:38:45 2012
Not After : Mon Apr 03 15:38:45 2062
Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
Fingerprint (MD5):
B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
Fingerprint (SHA1):
35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99
Certificate Trust Flags:
SSL Flags:
Valid CA
Trusted Client CA
Email Flags:
Object Signing Flags:
Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3978: OCSP: Verifying certificate(s) OCSPEE23.cert OCSPCA2.cert with flags -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB -t OCSPRoot - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3979: CRLDP: Creating DB RootDB - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190783 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n
===
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
chains.sh: #3980: CRLDP: Creating Root CA Root - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3981: CRLDP: Exporting Root CA Root.der - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #3982: CRLDP: Creating DB CA0DB - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA0Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3983: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1127190784 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3984: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #3985: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3986: CRLDP: Creating DB CA1DB - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127190673.crl
-1
-1
-1
n
n
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice: >
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice: > Enter value for the CRL Issuer name:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3987: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0Root-1127190660.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice >
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3988: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #3989: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #3990: CRLDP: Creating DB EE11DB - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE11Req.der -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127190673.crl
-1
-1
-1
n
n
===
Generating key. This may take a few moments...
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice: >
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice: > Enter value for the CRL Issuer name:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3991: CRLDP: Creating EE certifiate request EE11Req.der - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1127190785 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #3992: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #3993: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3994: CRLDP: Creating DB CA2DB - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127190673.crl
-1
-1
-1
n
n
===
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice: >
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice: > Enter value for the CRL Issuer name:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3995: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0Root-1127190661.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice >
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3996: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #3997: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #3998: CRLDP: Creating DB EE21DB - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE21Req.der < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
Generating key. This may take a few moments...
chains.sh: #3999: CRLDP: Creating EE certifiate request EE21Req.der - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1127190786 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
===
chains.sh: #4000: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #4001: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4002: CRLDP: Creating DB EE1DB - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127190673.crl
-1
-1
-1
n
n
===
Generating key. This may take a few moments...
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice: >
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice: > Enter value for the CRL Issuer name:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4003: CRLDP: Creating EE certifiate request EE1Req.der - PASSED
chains.sh: Creating certficate EE1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0Root-1127190662.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice >
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4004: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED
chains.sh: Importing certificate EE1CA0.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der
chains.sh: #4005: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #4006: CRLDP: Creating DB EE2DB - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE2Req.der -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127190673.crl
-1
-1
-1
n
n
===
Generating key. This may take a few moments...
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice: >
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice: > Enter value for the CRL Issuer name:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4007: CRLDP: Creating EE certifiate request EE2Req.der - PASSED
chains.sh: Creating certficate EE2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0Root-1127190663.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice >
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4008: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED
chains.sh: Importing certificate EE2CA0.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der
chains.sh: #4009: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128000827Z
nextupdate=20131128000827Z
===
CRL Info:
:
Version: 2 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=Root ROOT CA,O=Root,C=US"
This Update: Wed Nov 28 00:08:27 2012
Next Update: Thu Nov 28 00:08:27 2013
CRL Extensions:
chains.sh: #4010: CRLDP: Create CRL for RootDB - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128000827Z
nextupdate=20131128000827Z
===
CRL Info:
:
Version: 2 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
This Update: Wed Nov 28 00:08:27 2012
Next Update: Thu Nov 28 00:08:27 2013
CRL Extensions:
chains.sh: #4011: CRLDP: Create CRL for CA0DB - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128000827Z
nextupdate=20131128000827Z
===
CRL Info:
:
Version: 2 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
This Update: Wed Nov 28 00:08:27 2012
Next Update: Thu Nov 28 00:08:27 2013
CRL Extensions:
chains.sh: #4012: CRLDP: Create CRL for CA1DB - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128000827Z
nextupdate=20131128000827Z
===
CRL Info:
:
Version: 2 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
This Update: Wed Nov 28 00:08:27 2012
Next Update: Thu Nov 28 00:08:27 2013
CRL Extensions:
chains.sh: #4013: CRLDP: Create CRL for CA2DB - PASSED
chains.sh: Revoking certificate with SN 20 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128000828Z
addcert 20 20121128000828Z
===
CRL Info:
:
Version: 2 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
This Update: Wed Nov 28 00:08:28 2012
Next Update: Thu Nov 28 00:08:27 2013
Entry 1 (0x1):
Serial Number: 20 (0x14)
Revocation Date: Wed Nov 28 00:08:28 2012
CRL Extensions:
chains.sh: #4014: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED
chains.sh: Revoking certificate with SN 40 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128000829Z
addcert 40 20121128000829Z
===
CRL Info:
:
Version: 2 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
This Update: Wed Nov 28 00:08:29 2012
Next Update: Thu Nov 28 00:08:27 2013
Entry 1 (0x1):
Serial Number: 20 (0x14)
Revocation Date: Wed Nov 28 00:08:28 2012
Entry 2 (0x2):
Serial Number: 40 (0x28)
Revocation Date: Wed Nov 28 00:08:29 2012
CRL Extensions:
chains.sh: #4015: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4016: CRLDP: Creating DB AllDB - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4017: CRLDP: Importing certificate Root.der to AllDB database - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #4018: CRLDP: Importing CRL Root.crl to AllDB database - PASSED
chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -g chain -h requireFreshInfo -m crl -d AllDB -f -t Root.der
vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #4019: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -g chain -h requireFreshInfo -m crl -d AllDB -f -t Root.der - FAILED
chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -g chain -h requireFreshInfo -m crl -d AllDB -f -t Root.der
vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is fail
chains.sh: #4020: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -g chain -h requireFreshInfo -m crl -d AllDB -f -t Root.der - PASSED
chains.sh: Verifying certificate(s) EE1CA0.der with flags -g leaf -h requireFreshInfo -m crl -d AllDB -f -t Root.der
vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=EE1 EE,O=EE1,C=US [Certificate Authority]:
ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #4021: CRLDP: Verifying certificate(s) EE1CA0.der with flags -g leaf -h requireFreshInfo -m crl -d AllDB -f -t Root.der - FAILED
chains.sh: Verifying certificate(s) EE2CA0.der with flags -g leaf -h requireFreshInfo -m crl -d AllDB -f -t Root.der
vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=EE2 EE,O=EE2,C=US [Certificate Authority]:
ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is fail
chains.sh: #4022: CRLDP: Verifying certificate(s) EE2CA0.der with flags -g leaf -h requireFreshInfo -m crl -d AllDB -f -t Root.der - PASSED
trying to kill httpserv with PID 29344 at Tue Nov 27 19:08:42 EST 2012
kill -USR1 29344
selfserv: normal termination
httpserv -b -p 8553 2>/dev/null;
httpserv with PID 29344 killed at Tue Nov 27 19:08:42 EST 2012
TIMESTAMP chains END: Tue Nov 27 19:08:42 EST 2012
chains.sh: Testing with PKIX ===============================
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Tue Nov 27 19:08:42 EST 2012
lowhash.sh: Lowhash Tests ===============================
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #4023: lowhashtest with fips mode= for MD5 - PASSED
lowhashtest SHA1
lowhash.sh: #4024: lowhashtest with fips mode= for SHA1 - PASSED
lowhashtest SHA224
lowhash.sh: #4025: lowhashtest with fips mode= for SHA224 - PASSED
lowhashtest SHA256
lowhash.sh: #4026: lowhashtest with fips mode= for SHA256 - PASSED
lowhashtest SHA384
lowhash.sh: #4027: lowhashtest with fips mode= for SHA384 - PASSED
lowhashtest SHA512
lowhash.sh: #4028: lowhashtest with fips mode= for SHA512 - PASSED
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #4029: lowhashtest with fips mode= for MD5 - PASSED
lowhashtest SHA1
lowhash.sh: #4030: lowhashtest with fips mode= for SHA1 - PASSED
lowhashtest SHA224
lowhash.sh: #4031: lowhashtest with fips mode= for SHA224 - PASSED
lowhashtest SHA256
lowhash.sh: #4032: lowhashtest with fips mode= for SHA256 - PASSED
lowhashtest SHA384
lowhash.sh: #4033: lowhashtest with fips mode= for SHA384 - PASSED
lowhashtest SHA512
lowhash.sh: #4034: lowhashtest with fips mode= for SHA512 - PASSED
lowhash.sh done
TIMESTAMP lowhash END: Tue Nov 27 19:08:43 EST 2012
Running tests for libpkix
TIMESTAMP libpkix BEGIN: Tue Nov 27 19:08:43 EST 2012
TIMESTAMP libpkix END: Tue Nov 27 19:08:43 EST 2012
Running tests for cert
TIMESTAMP cert BEGIN: Tue Nov 27 19:08:43 EST 2012
cert.sh: Certutil and Crlutil Tests with ECC ===============================
cert.sh: #4035: Looking for root certs module. - PASSED
cert.sh: Creating a CA Certificate TestCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -f ../tests.pw
cert.sh: #4036: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #4037: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert TestCA --------------------------
certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #4038: Creating CA Cert TestCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n TestCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -o root.cert
cert.sh: #4039: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -f ../tests.pw
cert.sh: #4040: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #4041: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert serverCA --------------------------
certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #4042: Creating CA Cert serverCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -o root.cert
cert.sh: #4043: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating CA Cert chain-1-serverCA --------------------------
certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #4044: Creating CA Cert chain-1-serverCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -o root.cert
cert.sh: #4045: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating CA Cert chain-2-serverCA --------------------------
certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #4046: Creating CA Cert chain-2-serverCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -o root.cert
cert.sh: #4047: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -f ../tests.pw
cert.sh: #4048: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #4049: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert clientCA --------------------------
certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #4050: Creating CA Cert clientCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -o root.cert
cert.sh: #4051: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating CA Cert chain-1-clientCA --------------------------
certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #4052: Creating CA Cert chain-1-clientCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -o root.cert
cert.sh: #4053: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating CA Cert chain-2-clientCA --------------------------
certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #4054: Creating CA Cert chain-2-clientCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -o root.cert
cert.sh: #4055: Exporting Root Cert - PASSED
cert.sh: Creating an EC CA Certificate TestCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA
cert.sh: Creating EC CA Cert TestCA-ec --------------------------
certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #4056: Creating EC CA Cert TestCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n TestCA-ec -r -d . -o ecroot.cert
cert.sh: #4057: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating EC CA Cert serverCA-ec --------------------------
certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #4058: Creating EC CA Cert serverCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n serverCA-ec -r -d . -o ecroot.cert
cert.sh: #4059: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating EC CA Cert chain-1-serverCA-ec --------------------------
certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #4060: Creating EC CA Cert chain-1-serverCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #4061: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating EC CA Cert chain-2-serverCA-ec --------------------------
certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #4062: Creating EC CA Cert chain-2-serverCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #4063: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating EC CA Cert clientCA-ec --------------------------
certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #4064: Creating EC CA Cert clientCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n clientCA-ec -r -d . -o ecroot.cert
cert.sh: #4065: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating EC CA Cert chain-1-clientCA-ec --------------------------
certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #4066: Creating EC CA Cert chain-1-clientCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #4067: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating EC CA Cert chain-2-clientCA-ec --------------------------
certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #4068: Creating EC CA Cert chain-2-clientCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #4069: Exporting EC Root Cert - PASSED
cert.sh: Creating Certificates, issued by the last ===============
of a chain of CA's which are not in the same database============
Server Cert
cert.sh: Initializing buildnss02.usersys.redhat.com's Cert DB (ext.) --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -f ../tests.pw
cert.sh: #4070: Initializing buildnss02.usersys.redhat.com's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #4071: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4072: Generate Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 200 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -i req -o buildnss02.usersys.redhat.com.cert -f ../tests.pw
cert.sh: #4073: Sign buildnss02.usersys.redhat.com's Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's Cert -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com.cert
cert.sh: #4074: Import buildnss02.usersys.redhat.com's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Client Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n clientCA -t T,, -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/clientCA.ca.cert
cert.sh: #4075: Import Client Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Generate EC Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4076: Generate EC Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -i req -o buildnss02.usersys.redhat.com-ec.cert -f ../tests.pw
cert.sh: #4077: Sign buildnss02.usersys.redhat.com's EC Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's EC Cert -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com-ec.cert
cert.sh: #4078: Import buildnss02.usersys.redhat.com's EC Cert -t u,u,u (ext) - PASSED
cert.sh: Import Client EC Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/clientCA-ec.ca.cert
cert.sh: #4079: Import Client EC Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4080: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 201 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -i req -o buildnss02.usersys.redhat.com-ecmixed.cert -f ../tests.pw
cert.sh: #4081: Sign buildnss02.usersys.redhat.com's mixed EC Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's mixed EC Cert -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com-ecmixed.cert
cert.sh: #4082: Import buildnss02.usersys.redhat.com's mixed EC Cert -t u,u,u (ext) - PASSED
Importing all the server's own CA chain into the servers DB
cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/chain-2-serverCA-ec.ca.cert
cert.sh: #4083: Import chain-2-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Import chain-1-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/chain-1-serverCA.ca.cert
cert.sh: #4084: Import chain-1-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Import serverCA CA -t C,C,C for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/serverCA.ca.cert
cert.sh: #4085: Import serverCA CA -t C,C,C for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Import chain-2-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/chain-2-serverCA.ca.cert
cert.sh: #4086: Import chain-2-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Import serverCA-ec CA -t C,C,C for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/serverCA-ec.ca.cert
cert.sh: #4087: Import serverCA-ec CA -t C,C,C for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/chain-1-serverCA-ec.ca.cert
cert.sh: #4088: Import chain-1-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.) - PASSED
Client Cert
cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -f ../tests.pw
cert.sh: #4089: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #4090: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4091: Generate Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 300 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw
cert.sh: #4092: Sign ExtendedSSLUser's Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert
cert.sh: #4093: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/serverCA.ca.cert
cert.sh: #4094: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4095: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw
cert.sh: #4096: Sign ExtendedSSLUser's EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert
cert.sh: #4097: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/serverCA-ec.ca.cert
cert.sh: #4098: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4099: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 301 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw
cert.sh: #4100: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert
cert.sh: #4101: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED
Importing all the client's own CA chain into the servers DB
cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/chain-2-clientCA-ec.ca.cert
cert.sh: #4102: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/clientCA.ca.cert
cert.sh: #4103: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/chain-2-clientCA.ca.cert
cert.sh: #4104: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/clientCA-ec.ca.cert
cert.sh: #4105: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/chain-1-clientCA-ec.ca.cert
cert.sh: #4106: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/chain-1-clientCA.ca.cert
cert.sh: #4107: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh SUCCESS: EXT passed
cert.sh: Creating Client CA Issued Certificates ===============
cert.sh: Initializing TestUser's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw
cert.sh: #4108: Initializing TestUser's Cert DB - PASSED
cert.sh: Loading root cert module to TestUser's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #4109: Loading root cert module to TestUser's Cert DB - PASSED
cert.sh: Import Root CA for TestUser --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -i ../CA/TestCA.ca.cert
cert.sh: #4110: Import Root CA for TestUser - PASSED
cert.sh: Import EC Root CA for TestUser --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -i ../CA/TestCA-ec.ca.cert
cert.sh: #4111: Import EC Root CA for TestUser - PASSED
cert.sh: Generate Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4112: Generate Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's Request --------------------------
certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw
cert.sh: #4113: Sign TestUser's Request - PASSED
cert.sh: Import TestUser's Cert --------------------------
certutil -A -n TestUser -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser.cert
cert.sh: #4114: Import TestUser's Cert - PASSED
cert.sh SUCCESS: TestUser's Cert Created
cert.sh: Generate EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4115: Generate EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request --------------------------
certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw
cert.sh: #4116: Sign TestUser's EC Request - PASSED
cert.sh: Import TestUser's EC Cert --------------------------
certutil -A -n TestUser-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser-ec.cert
cert.sh: #4117: Import TestUser's EC Cert - PASSED
cert.sh SUCCESS: TestUser's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4118: Generate mixed EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw
cert.sh: #4119: Sign TestUser's EC Request with RSA - PASSED
cert.sh: Import TestUser's mixed EC Cert --------------------------
certutil -A -n TestUser-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser-ecmixed.cert
cert.sh: #4120: Import TestUser's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
buildnss02.usersys.redhat.com ------------------------------------
cert.sh: Initializing buildnss02.usersys.redhat.com's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw
cert.sh: #4121: Initializing buildnss02.usersys.redhat.com's Cert DB - PASSED
cert.sh: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #4122: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB - PASSED
cert.sh: Import Root CA for buildnss02.usersys.redhat.com --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -i ../CA/TestCA.ca.cert
cert.sh: #4123: Import Root CA for buildnss02.usersys.redhat.com - PASSED
cert.sh: Import EC Root CA for buildnss02.usersys.redhat.com --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -i ../CA/TestCA-ec.ca.cert
cert.sh: #4124: Import EC Root CA for buildnss02.usersys.redhat.com - PASSED
cert.sh: Generate Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4125: Generate Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's Request --------------------------
certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com.cert -f ../tests.pw
cert.sh: #4126: Sign buildnss02.usersys.redhat.com's Request - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02.usersys.redhat.com.cert
cert.sh: #4127: Import buildnss02.usersys.redhat.com's Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's Cert Created
cert.sh: Generate EC Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4128: Generate EC Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com-ec.cert -f ../tests.pw
cert.sh: #4129: Sign buildnss02.usersys.redhat.com's EC Request - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's EC Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02.usersys.redhat.com-ec.cert
cert.sh: #4130: Import buildnss02.usersys.redhat.com's EC Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4131: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com-ecmixed.cert -f ../tests.pw
cert.sh: #4132: Sign buildnss02.usersys.redhat.com's EC Request with RSA - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's mixed EC Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02.usersys.redhat.com-ecmixed.cert
cert.sh: #4133: Import buildnss02.usersys.redhat.com's mixed EC Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
buildnss02.usersys.redhat.com-sni --------------------------------
cert.sh: Generate Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4134: Generate Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's Request --------------------------
certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com.cert -f ../tests.pw
cert.sh: #4135: Sign buildnss02-sni.usersys.redhat.com's Request - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com.cert
cert.sh: #4136: Import buildnss02-sni.usersys.redhat.com's Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's Cert Created
cert.sh: Generate EC Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4137: Generate EC Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com-ec.cert -f ../tests.pw
cert.sh: #4138: Sign buildnss02-sni.usersys.redhat.com's EC Request - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's EC Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com-ec.cert
cert.sh: #4139: Import buildnss02-sni.usersys.redhat.com's EC Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4140: Generate mixed EC Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com-ecmixed.cert -f ../tests.pw
cert.sh: #4141: Sign buildnss02-sni.usersys.redhat.com's EC Request with RSA - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's mixed EC Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com-ecmixed.cert
cert.sh: #4142: Import buildnss02-sni.usersys.redhat.com's mixed EC Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's mixed EC Cert Created
cert.sh: Modify trust attributes of Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA -t TC,TC,TC -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw
cert.sh: #4143: Modify trust attributes of Root CA -t TC,TC,TC - PASSED
cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA-ec -t TC,TC,TC -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw
cert.sh: #4144: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED
cert.sh SUCCESS: SSL passed
cert.sh: Creating Client CA Issued Certificates ==============
cert.sh: Initializing Alice's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw
cert.sh: #4145: Initializing Alice's Cert DB - PASSED
cert.sh: Loading root cert module to Alice's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #4146: Loading root cert module to Alice's Cert DB - PASSED
cert.sh: Import Root CA for Alice --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -i ../CA/TestCA.ca.cert
cert.sh: #4147: Import Root CA for Alice - PASSED
cert.sh: Import EC Root CA for Alice --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -i ../CA/TestCA-ec.ca.cert
cert.sh: #4148: Import EC Root CA for Alice - PASSED
cert.sh: Generate Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4149: Generate Cert Request for Alice - PASSED
cert.sh: Sign Alice's Request --------------------------
certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw
cert.sh: #4150: Sign Alice's Request - PASSED
cert.sh: Import Alice's Cert --------------------------
certutil -A -n Alice -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -i Alice.cert
cert.sh: #4151: Import Alice's Cert - PASSED
cert.sh SUCCESS: Alice's Cert Created
cert.sh: Generate EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4152: Generate EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request --------------------------
certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw
cert.sh: #4153: Sign Alice's EC Request - PASSED
cert.sh: Import Alice's EC Cert --------------------------
certutil -A -n Alice-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -i Alice-ec.cert
cert.sh: #4154: Import Alice's EC Cert - PASSED
cert.sh SUCCESS: Alice's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4155: Generate mixed EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw
cert.sh: #4156: Sign Alice's EC Request with RSA - PASSED
cert.sh: Import Alice's mixed EC Cert --------------------------
certutil -A -n Alice-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -i Alice-ecmixed.cert
cert.sh: #4157: Import Alice's mixed EC Cert - PASSED
cert.sh SUCCESS: Alice's mixed EC Cert Created
cert.sh: Initializing Bob's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw
cert.sh: #4158: Initializing Bob's Cert DB - PASSED
cert.sh: Loading root cert module to Bob's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #4159: Loading root cert module to Bob's Cert DB - PASSED
cert.sh: Import Root CA for Bob --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -i ../CA/TestCA.ca.cert
cert.sh: #4160: Import Root CA for Bob - PASSED
cert.sh: Import EC Root CA for Bob --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -i ../CA/TestCA-ec.ca.cert
cert.sh: #4161: Import EC Root CA for Bob - PASSED
cert.sh: Generate Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4162: Generate Cert Request for Bob - PASSED
cert.sh: Sign Bob's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw
cert.sh: #4163: Sign Bob's Request - PASSED
cert.sh: Import Bob's Cert --------------------------
certutil -A -n Bob -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -i Bob.cert
cert.sh: #4164: Import Bob's Cert - PASSED
cert.sh SUCCESS: Bob's Cert Created
cert.sh: Generate EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4165: Generate EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw
cert.sh: #4166: Sign Bob's EC Request - PASSED
cert.sh: Import Bob's EC Cert --------------------------
certutil -A -n Bob-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -i Bob-ec.cert
cert.sh: #4167: Import Bob's EC Cert - PASSED
cert.sh SUCCESS: Bob's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4168: Generate mixed EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw
cert.sh: #4169: Sign Bob's EC Request with RSA - PASSED
cert.sh: Import Bob's mixed EC Cert --------------------------
certutil -A -n Bob-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -i Bob-ecmixed.cert
cert.sh: #4170: Import Bob's mixed EC Cert - PASSED
cert.sh SUCCESS: Bob's mixed EC Cert Created
cert.sh: Creating Dave's Certificate -------------------------
cert.sh: Initializing Dave's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw
cert.sh: #4171: Initializing Dave's Cert DB - PASSED
cert.sh: Loading root cert module to Dave's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #4172: Loading root cert module to Dave's Cert DB - PASSED
cert.sh: Import Root CA for Dave --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -i ../CA/TestCA.ca.cert
cert.sh: #4173: Import Root CA for Dave - PASSED
cert.sh: Import EC Root CA for Dave --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -i ../CA/TestCA-ec.ca.cert
cert.sh: #4174: Import EC Root CA for Dave - PASSED
cert.sh: Generate Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4175: Generate Cert Request for Dave - PASSED
cert.sh: Sign Dave's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw
cert.sh: #4176: Sign Dave's Request - PASSED
cert.sh: Import Dave's Cert --------------------------
certutil -A -n Dave -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -i Dave.cert
cert.sh: #4177: Import Dave's Cert - PASSED
cert.sh SUCCESS: Dave's Cert Created
cert.sh: Generate EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4178: Generate EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw
cert.sh: #4179: Sign Dave's EC Request - PASSED
cert.sh: Import Dave's EC Cert --------------------------
certutil -A -n Dave-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -i Dave-ec.cert
cert.sh: #4180: Import Dave's EC Cert - PASSED
cert.sh SUCCESS: Dave's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4181: Generate mixed EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw
cert.sh: #4182: Sign Dave's EC Request with RSA - PASSED
cert.sh: Import Dave's mixed EC Cert --------------------------
certutil -A -n Dave-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -i Dave-ecmixed.cert
cert.sh: #4183: Import Dave's mixed EC Cert - PASSED
cert.sh SUCCESS: Dave's mixed EC Cert Created
cert.sh: Creating multiEmail's Certificate --------------------
cert.sh: Initializing Eve's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw
cert.sh: #4184: Initializing Eve's Cert DB - PASSED
cert.sh: Loading root cert module to Eve's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #4185: Loading root cert module to Eve's Cert DB - PASSED
cert.sh: Import Root CA for Eve --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -i ../CA/TestCA.ca.cert
cert.sh: #4186: Import Root CA for Eve - PASSED
cert.sh: Import EC Root CA for Eve --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -i ../CA/TestCA-ec.ca.cert
cert.sh: #4187: Import EC Root CA for Eve - PASSED
cert.sh: Generate Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4188: Generate Cert Request for Eve - PASSED
cert.sh: Sign Eve's Request --------------------------
certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #4189: Sign Eve's Request - PASSED
cert.sh: Import Eve's Cert --------------------------
certutil -A -n Eve -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -i Eve.cert
cert.sh: #4190: Import Eve's Cert - PASSED
cert.sh SUCCESS: Eve's Cert Created
cert.sh: Generate EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4191: Generate EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request --------------------------
certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #4192: Sign Eve's EC Request - PASSED
cert.sh: Import Eve's EC Cert --------------------------
certutil -A -n Eve-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -i Eve-ec.cert
cert.sh: #4193: Import Eve's EC Cert - PASSED
cert.sh SUCCESS: Eve's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4194: Generate mixed EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #4195: Sign Eve's EC Request with RSA - PASSED
cert.sh: Import Eve's mixed EC Cert --------------------------
certutil -A -n Eve-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -i Eve-ecmixed.cert
cert.sh: #4196: Import Eve's mixed EC Cert - PASSED
cert.sh SUCCESS: Eve's mixed EC Cert Created
cert.sh: Importing Certificates ==============================
cert.sh: Import Bob's cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert
cert.sh: #4197: Import Bob's cert into Alice's db - PASSED
cert.sh: Import Dave's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #4198: Import Dave's cert into Alice's DB - PASSED
cert.sh: Import Dave's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #4199: Import Dave's cert into Bob's DB - PASSED
cert.sh: Import Eve's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #4200: Import Eve's cert into Alice's DB - PASSED
cert.sh: Import Eve's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #4201: Import Eve's cert into Bob's DB - PASSED
cert.sh: Importing EC Certificates ==============================
cert.sh: Import Bob's EC cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert
cert.sh: #4202: Import Bob's EC cert into Alice's db - PASSED
cert.sh: Import Dave's EC cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #4203: Import Dave's EC cert into Alice's DB - PASSED
cert.sh: Import Dave's EC cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #4204: Import Dave's EC cert into Bob's DB - PASSED
cert.sh SUCCESS: SMIME passed
cert.sh: Creating FIPS 140 DSA Certificates ==============
cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips -f ../tests.fipspw
cert.sh: #4205: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED
cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #4206: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED
cert.sh: Enable FIPS mode on database -----------------------
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips -fips true
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
FIPS mode enabled.
cert.sh: #4207: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED
cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate --------------------------
certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise
Generating key. This may take a few moments...
cert.sh: #4208: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED
cert.sh SUCCESS: FIPS passed
cert.sh: Creating Server CA Issued Certificate for
EC Curves Test Certificates ------------------------------------
cert.sh: Initializing EC Curve's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw
cert.sh: #4209: Initializing EC Curve's Cert DB - PASSED
cert.sh: Loading root cert module to EC Curve's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #4210: Loading root cert module to EC Curve's Cert DB - PASSED
cert.sh: Import EC Root CA for EC Curves Test Certificates --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -i ../CA/TestCA-ec.ca.cert
cert.sh: #4211: Import EC Root CA for EC Curves Test Certificates - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v1 --------------------------
certutil -s "CN=Curve-c2pnb163v1, E=Curve-c2pnb163v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4212: Generate EC Cert Request for Curve-c2pnb163v1 - PASSED
cert.sh: Sign Curve-c2pnb163v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-c2pnb163v1-ec.cert -f ../tests.pw
cert.sh: #4213: Sign Curve-c2pnb163v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb163v1-ec.cert
cert.sh: #4214: Import Curve-c2pnb163v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v2 --------------------------
certutil -s "CN=Curve-c2pnb163v2, E=Curve-c2pnb163v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4215: Generate EC Cert Request for Curve-c2pnb163v2 - PASSED
cert.sh: Sign Curve-c2pnb163v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-c2pnb163v2-ec.cert -f ../tests.pw
cert.sh: #4216: Sign Curve-c2pnb163v2's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v2's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb163v2-ec.cert
cert.sh: #4217: Import Curve-c2pnb163v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v3 --------------------------
certutil -s "CN=Curve-c2pnb163v3, E=Curve-c2pnb163v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4218: Generate EC Cert Request for Curve-c2pnb163v3 - PASSED
cert.sh: Sign Curve-c2pnb163v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-c2pnb163v3-ec.cert -f ../tests.pw
cert.sh: #4219: Sign Curve-c2pnb163v3's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v3's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb163v3-ec.cert
cert.sh: #4220: Import Curve-c2pnb163v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb176v1 --------------------------
certutil -s "CN=Curve-c2pnb176v1, E=Curve-c2pnb176v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb176v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4221: Generate EC Cert Request for Curve-c2pnb176v1 - PASSED
cert.sh: Sign Curve-c2pnb176v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2004 -v 60 -d ../CA -i req -o Curve-c2pnb176v1-ec.cert -f ../tests.pw
cert.sh: #4222: Sign Curve-c2pnb176v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb176v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb176v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb176v1-ec.cert
cert.sh: #4223: Import Curve-c2pnb176v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb208w1 --------------------------
certutil -s "CN=Curve-c2pnb208w1, E=Curve-c2pnb208w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb208w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4224: Generate EC Cert Request for Curve-c2pnb208w1 - PASSED
cert.sh: Sign Curve-c2pnb208w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2005 -v 60 -d ../CA -i req -o Curve-c2pnb208w1-ec.cert -f ../tests.pw
cert.sh: #4225: Sign Curve-c2pnb208w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb208w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb208w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb208w1-ec.cert
cert.sh: #4226: Import Curve-c2pnb208w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb272w1 --------------------------
certutil -s "CN=Curve-c2pnb272w1, E=Curve-c2pnb272w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb272w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4227: Generate EC Cert Request for Curve-c2pnb272w1 - PASSED
cert.sh: Sign Curve-c2pnb272w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2006 -v 60 -d ../CA -i req -o Curve-c2pnb272w1-ec.cert -f ../tests.pw
cert.sh: #4228: Sign Curve-c2pnb272w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb272w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb272w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb272w1-ec.cert
cert.sh: #4229: Import Curve-c2pnb272w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb304w1 --------------------------
certutil -s "CN=Curve-c2pnb304w1, E=Curve-c2pnb304w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb304w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4230: Generate EC Cert Request for Curve-c2pnb304w1 - PASSED
cert.sh: Sign Curve-c2pnb304w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2007 -v 60 -d ../CA -i req -o Curve-c2pnb304w1-ec.cert -f ../tests.pw
cert.sh: #4231: Sign Curve-c2pnb304w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb304w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb304w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb304w1-ec.cert
cert.sh: #4232: Import Curve-c2pnb304w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb368w1 --------------------------
certutil -s "CN=Curve-c2pnb368w1, E=Curve-c2pnb368w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb368w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4233: Generate EC Cert Request for Curve-c2pnb368w1 - PASSED
cert.sh: Sign Curve-c2pnb368w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2008 -v 60 -d ../CA -i req -o Curve-c2pnb368w1-ec.cert -f ../tests.pw
cert.sh: #4234: Sign Curve-c2pnb368w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb368w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb368w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb368w1-ec.cert
cert.sh: #4235: Import Curve-c2pnb368w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v1 --------------------------
certutil -s "CN=Curve-c2tnb191v1, E=Curve-c2tnb191v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4236: Generate EC Cert Request for Curve-c2tnb191v1 - PASSED
cert.sh: Sign Curve-c2tnb191v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2009 -v 60 -d ../CA -i req -o Curve-c2tnb191v1-ec.cert -f ../tests.pw
cert.sh: #4237: Sign Curve-c2tnb191v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb191v1-ec.cert
cert.sh: #4238: Import Curve-c2tnb191v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v2 --------------------------
certutil -s "CN=Curve-c2tnb191v2, E=Curve-c2tnb191v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4239: Generate EC Cert Request for Curve-c2tnb191v2 - PASSED
cert.sh: Sign Curve-c2tnb191v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2010 -v 60 -d ../CA -i req -o Curve-c2tnb191v2-ec.cert -f ../tests.pw
cert.sh: #4240: Sign Curve-c2tnb191v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb191v2-ec.cert
cert.sh: #4241: Import Curve-c2tnb191v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v3 --------------------------
certutil -s "CN=Curve-c2tnb191v3, E=Curve-c2tnb191v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4242: Generate EC Cert Request for Curve-c2tnb191v3 - PASSED
cert.sh: Sign Curve-c2tnb191v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2011 -v 60 -d ../CA -i req -o Curve-c2tnb191v3-ec.cert -f ../tests.pw
cert.sh: #4243: Sign Curve-c2tnb191v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb191v3-ec.cert
cert.sh: #4244: Import Curve-c2tnb191v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v1 --------------------------
certutil -s "CN=Curve-c2tnb239v1, E=Curve-c2tnb239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4245: Generate EC Cert Request for Curve-c2tnb239v1 - PASSED
cert.sh: Sign Curve-c2tnb239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2012 -v 60 -d ../CA -i req -o Curve-c2tnb239v1-ec.cert -f ../tests.pw
cert.sh: #4246: Sign Curve-c2tnb239v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb239v1-ec.cert
cert.sh: #4247: Import Curve-c2tnb239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v2 --------------------------
certutil -s "CN=Curve-c2tnb239v2, E=Curve-c2tnb239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4248: Generate EC Cert Request for Curve-c2tnb239v2 - PASSED
cert.sh: Sign Curve-c2tnb239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2013 -v 60 -d ../CA -i req -o Curve-c2tnb239v2-ec.cert -f ../tests.pw
cert.sh: #4249: Sign Curve-c2tnb239v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb239v2-ec.cert
cert.sh: #4250: Import Curve-c2tnb239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v3 --------------------------
certutil -s "CN=Curve-c2tnb239v3, E=Curve-c2tnb239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4251: Generate EC Cert Request for Curve-c2tnb239v3 - PASSED
cert.sh: Sign Curve-c2tnb239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2014 -v 60 -d ../CA -i req -o Curve-c2tnb239v3-ec.cert -f ../tests.pw
cert.sh: #4252: Sign Curve-c2tnb239v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb239v3-ec.cert
cert.sh: #4253: Import Curve-c2tnb239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb359v1 --------------------------
certutil -s "CN=Curve-c2tnb359v1, E=Curve-c2tnb359v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb359v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4254: Generate EC Cert Request for Curve-c2tnb359v1 - PASSED
cert.sh: Sign Curve-c2tnb359v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2015 -v 60 -d ../CA -i req -o Curve-c2tnb359v1-ec.cert -f ../tests.pw
cert.sh: #4255: Sign Curve-c2tnb359v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb359v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb359v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb359v1-ec.cert
cert.sh: #4256: Import Curve-c2tnb359v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb431r1 --------------------------
certutil -s "CN=Curve-c2tnb431r1, E=Curve-c2tnb431r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb431r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4257: Generate EC Cert Request for Curve-c2tnb431r1 - PASSED
cert.sh: Sign Curve-c2tnb431r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2016 -v 60 -d ../CA -i req -o Curve-c2tnb431r1-ec.cert -f ../tests.pw
cert.sh: #4258: Sign Curve-c2tnb431r1's EC Request - PASSED
cert.sh: Import Curve-c2tnb431r1's EC Cert --------------------------
certutil -A -n Curve-c2tnb431r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb431r1-ec.cert
cert.sh: #4259: Import Curve-c2tnb431r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb163 --------------------------
certutil -s "CN=Curve-nistb163, E=Curve-nistb163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb163 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4260: Generate EC Cert Request for Curve-nistb163 - PASSED
cert.sh: Sign Curve-nistb163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2017 -v 60 -d ../CA -i req -o Curve-nistb163-ec.cert -f ../tests.pw
cert.sh: #4261: Sign Curve-nistb163's EC Request - PASSED
cert.sh: Import Curve-nistb163's EC Cert --------------------------
certutil -A -n Curve-nistb163-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistb163-ec.cert
cert.sh: #4262: Import Curve-nistb163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb233 --------------------------
certutil -s "CN=Curve-nistb233, E=Curve-nistb233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb233 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4263: Generate EC Cert Request for Curve-nistb233 - PASSED
cert.sh: Sign Curve-nistb233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2018 -v 60 -d ../CA -i req -o Curve-nistb233-ec.cert -f ../tests.pw
cert.sh: #4264: Sign Curve-nistb233's EC Request - PASSED
cert.sh: Import Curve-nistb233's EC Cert --------------------------
certutil -A -n Curve-nistb233-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistb233-ec.cert
cert.sh: #4265: Import Curve-nistb233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb283 --------------------------
certutil -s "CN=Curve-nistb283, E=Curve-nistb283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb283 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4266: Generate EC Cert Request for Curve-nistb283 - PASSED
cert.sh: Sign Curve-nistb283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2019 -v 60 -d ../CA -i req -o Curve-nistb283-ec.cert -f ../tests.pw
cert.sh: #4267: Sign Curve-nistb283's EC Request - PASSED
cert.sh: Import Curve-nistb283's EC Cert --------------------------
certutil -A -n Curve-nistb283-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistb283-ec.cert
cert.sh: #4268: Import Curve-nistb283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb409 --------------------------
certutil -s "CN=Curve-nistb409, E=Curve-nistb409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb409 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4269: Generate EC Cert Request for Curve-nistb409 - PASSED
cert.sh: Sign Curve-nistb409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2020 -v 60 -d ../CA -i req -o Curve-nistb409-ec.cert -f ../tests.pw
cert.sh: #4270: Sign Curve-nistb409's EC Request - PASSED
cert.sh: Import Curve-nistb409's EC Cert --------------------------
certutil -A -n Curve-nistb409-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistb409-ec.cert
cert.sh: #4271: Import Curve-nistb409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb571 --------------------------
certutil -s "CN=Curve-nistb571, E=Curve-nistb571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb571 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4272: Generate EC Cert Request for Curve-nistb571 - PASSED
cert.sh: Sign Curve-nistb571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2021 -v 60 -d ../CA -i req -o Curve-nistb571-ec.cert -f ../tests.pw
cert.sh: #4273: Sign Curve-nistb571's EC Request - PASSED
cert.sh: Import Curve-nistb571's EC Cert --------------------------
certutil -A -n Curve-nistb571-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistb571-ec.cert
cert.sh: #4274: Import Curve-nistb571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk163 --------------------------
certutil -s "CN=Curve-nistk163, E=Curve-nistk163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk163 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4275: Generate EC Cert Request for Curve-nistk163 - PASSED
cert.sh: Sign Curve-nistk163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2022 -v 60 -d ../CA -i req -o Curve-nistk163-ec.cert -f ../tests.pw
cert.sh: #4276: Sign Curve-nistk163's EC Request - PASSED
cert.sh: Import Curve-nistk163's EC Cert --------------------------
certutil -A -n Curve-nistk163-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistk163-ec.cert
cert.sh: #4277: Import Curve-nistk163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk233 --------------------------
certutil -s "CN=Curve-nistk233, E=Curve-nistk233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk233 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4278: Generate EC Cert Request for Curve-nistk233 - PASSED
cert.sh: Sign Curve-nistk233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2023 -v 60 -d ../CA -i req -o Curve-nistk233-ec.cert -f ../tests.pw
cert.sh: #4279: Sign Curve-nistk233's EC Request - PASSED
cert.sh: Import Curve-nistk233's EC Cert --------------------------
certutil -A -n Curve-nistk233-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistk233-ec.cert
cert.sh: #4280: Import Curve-nistk233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk283 --------------------------
certutil -s "CN=Curve-nistk283, E=Curve-nistk283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk283 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4281: Generate EC Cert Request for Curve-nistk283 - PASSED
cert.sh: Sign Curve-nistk283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2024 -v 60 -d ../CA -i req -o Curve-nistk283-ec.cert -f ../tests.pw
cert.sh: #4282: Sign Curve-nistk283's EC Request - PASSED
cert.sh: Import Curve-nistk283's EC Cert --------------------------
certutil -A -n Curve-nistk283-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistk283-ec.cert
cert.sh: #4283: Import Curve-nistk283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk409 --------------------------
certutil -s "CN=Curve-nistk409, E=Curve-nistk409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk409 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4284: Generate EC Cert Request for Curve-nistk409 - PASSED
cert.sh: Sign Curve-nistk409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2025 -v 60 -d ../CA -i req -o Curve-nistk409-ec.cert -f ../tests.pw
cert.sh: #4285: Sign Curve-nistk409's EC Request - PASSED
cert.sh: Import Curve-nistk409's EC Cert --------------------------
certutil -A -n Curve-nistk409-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistk409-ec.cert
cert.sh: #4286: Import Curve-nistk409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk571 --------------------------
certutil -s "CN=Curve-nistk571, E=Curve-nistk571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk571 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4287: Generate EC Cert Request for Curve-nistk571 - PASSED
cert.sh: Sign Curve-nistk571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2026 -v 60 -d ../CA -i req -o Curve-nistk571-ec.cert -f ../tests.pw
cert.sh: #4288: Sign Curve-nistk571's EC Request - PASSED
cert.sh: Import Curve-nistk571's EC Cert --------------------------
certutil -A -n Curve-nistk571-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistk571-ec.cert
cert.sh: #4289: Import Curve-nistk571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp192 --------------------------
certutil -s "CN=Curve-nistp192, E=Curve-nistp192-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp192 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4290: Generate EC Cert Request for Curve-nistp192 - PASSED
cert.sh: Sign Curve-nistp192's EC Request --------------------------
certutil -C -c TestCA-ec -m 2027 -v 60 -d ../CA -i req -o Curve-nistp192-ec.cert -f ../tests.pw
cert.sh: #4291: Sign Curve-nistp192's EC Request - PASSED
cert.sh: Import Curve-nistp192's EC Cert --------------------------
certutil -A -n Curve-nistp192-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistp192-ec.cert
cert.sh: #4292: Import Curve-nistp192's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp224 --------------------------
certutil -s "CN=Curve-nistp224, E=Curve-nistp224-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp224 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4293: Generate EC Cert Request for Curve-nistp224 - PASSED
cert.sh: Sign Curve-nistp224's EC Request --------------------------
certutil -C -c TestCA-ec -m 2028 -v 60 -d ../CA -i req -o Curve-nistp224-ec.cert -f ../tests.pw
cert.sh: #4294: Sign Curve-nistp224's EC Request - PASSED
cert.sh: Import Curve-nistp224's EC Cert --------------------------
certutil -A -n Curve-nistp224-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistp224-ec.cert
cert.sh: #4295: Import Curve-nistp224's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp256 --------------------------
certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4296: Generate EC Cert Request for Curve-nistp256 - PASSED
cert.sh: Sign Curve-nistp256's EC Request --------------------------
certutil -C -c TestCA-ec -m 2029 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw
cert.sh: #4297: Sign Curve-nistp256's EC Request - PASSED
cert.sh: Import Curve-nistp256's EC Cert --------------------------
certutil -A -n Curve-nistp256-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert
cert.sh: #4298: Import Curve-nistp256's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp384 --------------------------
certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4299: Generate EC Cert Request for Curve-nistp384 - PASSED
cert.sh: Sign Curve-nistp384's EC Request --------------------------
certutil -C -c TestCA-ec -m 2030 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw
cert.sh: #4300: Sign Curve-nistp384's EC Request - PASSED
cert.sh: Import Curve-nistp384's EC Cert --------------------------
certutil -A -n Curve-nistp384-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert
cert.sh: #4301: Import Curve-nistp384's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp521 --------------------------
certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4302: Generate EC Cert Request for Curve-nistp521 - PASSED
cert.sh: Sign Curve-nistp521's EC Request --------------------------
certutil -C -c TestCA-ec -m 2031 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw
cert.sh: #4303: Sign Curve-nistp521's EC Request - PASSED
cert.sh: Import Curve-nistp521's EC Cert --------------------------
certutil -A -n Curve-nistp521-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert
cert.sh: #4304: Import Curve-nistp521's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v1 --------------------------
certutil -s "CN=Curve-prime192v1, E=Curve-prime192v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4305: Generate EC Cert Request for Curve-prime192v1 - PASSED
cert.sh: Sign Curve-prime192v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2032 -v 60 -d ../CA -i req -o Curve-prime192v1-ec.cert -f ../tests.pw
cert.sh: #4306: Sign Curve-prime192v1's EC Request - PASSED
cert.sh: Import Curve-prime192v1's EC Cert --------------------------
certutil -A -n Curve-prime192v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime192v1-ec.cert
cert.sh: #4307: Import Curve-prime192v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v2 --------------------------
certutil -s "CN=Curve-prime192v2, E=Curve-prime192v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4308: Generate EC Cert Request for Curve-prime192v2 - PASSED
cert.sh: Sign Curve-prime192v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2033 -v 60 -d ../CA -i req -o Curve-prime192v2-ec.cert -f ../tests.pw
cert.sh: #4309: Sign Curve-prime192v2's EC Request - PASSED
cert.sh: Import Curve-prime192v2's EC Cert --------------------------
certutil -A -n Curve-prime192v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime192v2-ec.cert
cert.sh: #4310: Import Curve-prime192v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v3 --------------------------
certutil -s "CN=Curve-prime192v3, E=Curve-prime192v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4311: Generate EC Cert Request for Curve-prime192v3 - PASSED
cert.sh: Sign Curve-prime192v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2034 -v 60 -d ../CA -i req -o Curve-prime192v3-ec.cert -f ../tests.pw
cert.sh: #4312: Sign Curve-prime192v3's EC Request - PASSED
cert.sh: Import Curve-prime192v3's EC Cert --------------------------
certutil -A -n Curve-prime192v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime192v3-ec.cert
cert.sh: #4313: Import Curve-prime192v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v1 --------------------------
certutil -s "CN=Curve-prime239v1, E=Curve-prime239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4314: Generate EC Cert Request for Curve-prime239v1 - PASSED
cert.sh: Sign Curve-prime239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2035 -v 60 -d ../CA -i req -o Curve-prime239v1-ec.cert -f ../tests.pw
cert.sh: #4315: Sign Curve-prime239v1's EC Request - PASSED
cert.sh: Import Curve-prime239v1's EC Cert --------------------------
certutil -A -n Curve-prime239v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime239v1-ec.cert
cert.sh: #4316: Import Curve-prime239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v2 --------------------------
certutil -s "CN=Curve-prime239v2, E=Curve-prime239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4317: Generate EC Cert Request for Curve-prime239v2 - PASSED
cert.sh: Sign Curve-prime239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2036 -v 60 -d ../CA -i req -o Curve-prime239v2-ec.cert -f ../tests.pw
cert.sh: #4318: Sign Curve-prime239v2's EC Request - PASSED
cert.sh: Import Curve-prime239v2's EC Cert --------------------------
certutil -A -n Curve-prime239v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime239v2-ec.cert
cert.sh: #4319: Import Curve-prime239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v3 --------------------------
certutil -s "CN=Curve-prime239v3, E=Curve-prime239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4320: Generate EC Cert Request for Curve-prime239v3 - PASSED
cert.sh: Sign Curve-prime239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2037 -v 60 -d ../CA -i req -o Curve-prime239v3-ec.cert -f ../tests.pw
cert.sh: #4321: Sign Curve-prime239v3's EC Request - PASSED
cert.sh: Import Curve-prime239v3's EC Cert --------------------------
certutil -A -n Curve-prime239v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime239v3-ec.cert
cert.sh: #4322: Import Curve-prime239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r1 --------------------------
certutil -s "CN=Curve-secp112r1, E=Curve-secp112r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4323: Generate EC Cert Request for Curve-secp112r1 - PASSED
cert.sh: Sign Curve-secp112r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2038 -v 60 -d ../CA -i req -o Curve-secp112r1-ec.cert -f ../tests.pw
cert.sh: #4324: Sign Curve-secp112r1's EC Request - PASSED
cert.sh: Import Curve-secp112r1's EC Cert --------------------------
certutil -A -n Curve-secp112r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp112r1-ec.cert
cert.sh: #4325: Import Curve-secp112r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r2 --------------------------
certutil -s "CN=Curve-secp112r2, E=Curve-secp112r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4326: Generate EC Cert Request for Curve-secp112r2 - PASSED
cert.sh: Sign Curve-secp112r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2039 -v 60 -d ../CA -i req -o Curve-secp112r2-ec.cert -f ../tests.pw
cert.sh: #4327: Sign Curve-secp112r2's EC Request - PASSED
cert.sh: Import Curve-secp112r2's EC Cert --------------------------
certutil -A -n Curve-secp112r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp112r2-ec.cert
cert.sh: #4328: Import Curve-secp112r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r1 --------------------------
certutil -s "CN=Curve-secp128r1, E=Curve-secp128r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4329: Generate EC Cert Request for Curve-secp128r1 - PASSED
cert.sh: Sign Curve-secp128r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2040 -v 60 -d ../CA -i req -o Curve-secp128r1-ec.cert -f ../tests.pw
cert.sh: #4330: Sign Curve-secp128r1's EC Request - PASSED
cert.sh: Import Curve-secp128r1's EC Cert --------------------------
certutil -A -n Curve-secp128r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp128r1-ec.cert
cert.sh: #4331: Import Curve-secp128r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r2 --------------------------
certutil -s "CN=Curve-secp128r2, E=Curve-secp128r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4332: Generate EC Cert Request for Curve-secp128r2 - PASSED
cert.sh: Sign Curve-secp128r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2041 -v 60 -d ../CA -i req -o Curve-secp128r2-ec.cert -f ../tests.pw
cert.sh: #4333: Sign Curve-secp128r2's EC Request - PASSED
cert.sh: Import Curve-secp128r2's EC Cert --------------------------
certutil -A -n Curve-secp128r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp128r2-ec.cert
cert.sh: #4334: Import Curve-secp128r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160k1 --------------------------
certutil -s "CN=Curve-secp160k1, E=Curve-secp160k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4335: Generate EC Cert Request for Curve-secp160k1 - PASSED
cert.sh: Sign Curve-secp160k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2042 -v 60 -d ../CA -i req -o Curve-secp160k1-ec.cert -f ../tests.pw
cert.sh: #4336: Sign Curve-secp160k1's EC Request - PASSED
cert.sh: Import Curve-secp160k1's EC Cert --------------------------
certutil -A -n Curve-secp160k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp160k1-ec.cert
cert.sh: #4337: Import Curve-secp160k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r1 --------------------------
certutil -s "CN=Curve-secp160r1, E=Curve-secp160r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4338: Generate EC Cert Request for Curve-secp160r1 - PASSED
cert.sh: Sign Curve-secp160r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2043 -v 60 -d ../CA -i req -o Curve-secp160r1-ec.cert -f ../tests.pw
cert.sh: #4339: Sign Curve-secp160r1's EC Request - PASSED
cert.sh: Import Curve-secp160r1's EC Cert --------------------------
certutil -A -n Curve-secp160r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp160r1-ec.cert
cert.sh: #4340: Import Curve-secp160r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r2 --------------------------
certutil -s "CN=Curve-secp160r2, E=Curve-secp160r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4341: Generate EC Cert Request for Curve-secp160r2 - PASSED
cert.sh: Sign Curve-secp160r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2044 -v 60 -d ../CA -i req -o Curve-secp160r2-ec.cert -f ../tests.pw
cert.sh: #4342: Sign Curve-secp160r2's EC Request - PASSED
cert.sh: Import Curve-secp160r2's EC Cert --------------------------
certutil -A -n Curve-secp160r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp160r2-ec.cert
cert.sh: #4343: Import Curve-secp160r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192k1 --------------------------
certutil -s "CN=Curve-secp192k1, E=Curve-secp192k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4344: Generate EC Cert Request for Curve-secp192k1 - PASSED
cert.sh: Sign Curve-secp192k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2045 -v 60 -d ../CA -i req -o Curve-secp192k1-ec.cert -f ../tests.pw
cert.sh: #4345: Sign Curve-secp192k1's EC Request - PASSED
cert.sh: Import Curve-secp192k1's EC Cert --------------------------
certutil -A -n Curve-secp192k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp192k1-ec.cert
cert.sh: #4346: Import Curve-secp192k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192r1 --------------------------
certutil -s "CN=Curve-secp192r1, E=Curve-secp192r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4347: Generate EC Cert Request for Curve-secp192r1 - PASSED
cert.sh: Sign Curve-secp192r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2046 -v 60 -d ../CA -i req -o Curve-secp192r1-ec.cert -f ../tests.pw
cert.sh: #4348: Sign Curve-secp192r1's EC Request - PASSED
cert.sh: Import Curve-secp192r1's EC Cert --------------------------
certutil -A -n Curve-secp192r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp192r1-ec.cert
cert.sh: #4349: Import Curve-secp192r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224k1 --------------------------
certutil -s "CN=Curve-secp224k1, E=Curve-secp224k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4350: Generate EC Cert Request for Curve-secp224k1 - PASSED
cert.sh: Sign Curve-secp224k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2047 -v 60 -d ../CA -i req -o Curve-secp224k1-ec.cert -f ../tests.pw
cert.sh: #4351: Sign Curve-secp224k1's EC Request - PASSED
cert.sh: Import Curve-secp224k1's EC Cert --------------------------
certutil -A -n Curve-secp224k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp224k1-ec.cert
cert.sh: #4352: Import Curve-secp224k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224r1 --------------------------
certutil -s "CN=Curve-secp224r1, E=Curve-secp224r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4353: Generate EC Cert Request for Curve-secp224r1 - PASSED
cert.sh: Sign Curve-secp224r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2048 -v 60 -d ../CA -i req -o Curve-secp224r1-ec.cert -f ../tests.pw
cert.sh: #4354: Sign Curve-secp224r1's EC Request - PASSED
cert.sh: Import Curve-secp224r1's EC Cert --------------------------
certutil -A -n Curve-secp224r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp224r1-ec.cert
cert.sh: #4355: Import Curve-secp224r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256k1 --------------------------
certutil -s "CN=Curve-secp256k1, E=Curve-secp256k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4356: Generate EC Cert Request for Curve-secp256k1 - PASSED
cert.sh: Sign Curve-secp256k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2049 -v 60 -d ../CA -i req -o Curve-secp256k1-ec.cert -f ../tests.pw
cert.sh: #4357: Sign Curve-secp256k1's EC Request - PASSED
cert.sh: Import Curve-secp256k1's EC Cert --------------------------
certutil -A -n Curve-secp256k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp256k1-ec.cert
cert.sh: #4358: Import Curve-secp256k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256r1 --------------------------
certutil -s "CN=Curve-secp256r1, E=Curve-secp256r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4359: Generate EC Cert Request for Curve-secp256r1 - PASSED
cert.sh: Sign Curve-secp256r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2050 -v 60 -d ../CA -i req -o Curve-secp256r1-ec.cert -f ../tests.pw
cert.sh: #4360: Sign Curve-secp256r1's EC Request - PASSED
cert.sh: Import Curve-secp256r1's EC Cert --------------------------
certutil -A -n Curve-secp256r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp256r1-ec.cert
cert.sh: #4361: Import Curve-secp256r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp384r1 --------------------------
certutil -s "CN=Curve-secp384r1, E=Curve-secp384r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4362: Generate EC Cert Request for Curve-secp384r1 - PASSED
cert.sh: Sign Curve-secp384r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2051 -v 60 -d ../CA -i req -o Curve-secp384r1-ec.cert -f ../tests.pw
cert.sh: #4363: Sign Curve-secp384r1's EC Request - PASSED
cert.sh: Import Curve-secp384r1's EC Cert --------------------------
certutil -A -n Curve-secp384r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp384r1-ec.cert
cert.sh: #4364: Import Curve-secp384r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp521r1 --------------------------
certutil -s "CN=Curve-secp521r1, E=Curve-secp521r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp521r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4365: Generate EC Cert Request for Curve-secp521r1 - PASSED
cert.sh: Sign Curve-secp521r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2052 -v 60 -d ../CA -i req -o Curve-secp521r1-ec.cert -f ../tests.pw
cert.sh: #4366: Sign Curve-secp521r1's EC Request - PASSED
cert.sh: Import Curve-secp521r1's EC Cert --------------------------
certutil -A -n Curve-secp521r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp521r1-ec.cert
cert.sh: #4367: Import Curve-secp521r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r1 --------------------------
certutil -s "CN=Curve-sect113r1, E=Curve-sect113r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4368: Generate EC Cert Request for Curve-sect113r1 - PASSED
cert.sh: Sign Curve-sect113r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2053 -v 60 -d ../CA -i req -o Curve-sect113r1-ec.cert -f ../tests.pw
cert.sh: #4369: Sign Curve-sect113r1's EC Request - PASSED
cert.sh: Import Curve-sect113r1's EC Cert --------------------------
certutil -A -n Curve-sect113r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect113r1-ec.cert
cert.sh: #4370: Import Curve-sect113r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r2 --------------------------
certutil -s "CN=Curve-sect113r2, E=Curve-sect113r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4371: Generate EC Cert Request for Curve-sect113r2 - PASSED
cert.sh: Sign Curve-sect113r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2054 -v 60 -d ../CA -i req -o Curve-sect113r2-ec.cert -f ../tests.pw
cert.sh: #4372: Sign Curve-sect113r2's EC Request - PASSED
cert.sh: Import Curve-sect113r2's EC Cert --------------------------
certutil -A -n Curve-sect113r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect113r2-ec.cert
cert.sh: #4373: Import Curve-sect113r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r1 --------------------------
certutil -s "CN=Curve-sect131r1, E=Curve-sect131r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4374: Generate EC Cert Request for Curve-sect131r1 - PASSED
cert.sh: Sign Curve-sect131r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2055 -v 60 -d ../CA -i req -o Curve-sect131r1-ec.cert -f ../tests.pw
cert.sh: #4375: Sign Curve-sect131r1's EC Request - PASSED
cert.sh: Import Curve-sect131r1's EC Cert --------------------------
certutil -A -n Curve-sect131r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect131r1-ec.cert
cert.sh: #4376: Import Curve-sect131r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r2 --------------------------
certutil -s "CN=Curve-sect131r2, E=Curve-sect131r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4377: Generate EC Cert Request for Curve-sect131r2 - PASSED
cert.sh: Sign Curve-sect131r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2056 -v 60 -d ../CA -i req -o Curve-sect131r2-ec.cert -f ../tests.pw
cert.sh: #4378: Sign Curve-sect131r2's EC Request - PASSED
cert.sh: Import Curve-sect131r2's EC Cert --------------------------
certutil -A -n Curve-sect131r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect131r2-ec.cert
cert.sh: #4379: Import Curve-sect131r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163k1 --------------------------
certutil -s "CN=Curve-sect163k1, E=Curve-sect163k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4380: Generate EC Cert Request for Curve-sect163k1 - PASSED
cert.sh: Sign Curve-sect163k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2057 -v 60 -d ../CA -i req -o Curve-sect163k1-ec.cert -f ../tests.pw
cert.sh: #4381: Sign Curve-sect163k1's EC Request - PASSED
cert.sh: Import Curve-sect163k1's EC Cert --------------------------
certutil -A -n Curve-sect163k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect163k1-ec.cert
cert.sh: #4382: Import Curve-sect163k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r1 --------------------------
certutil -s "CN=Curve-sect163r1, E=Curve-sect163r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4383: Generate EC Cert Request for Curve-sect163r1 - PASSED
cert.sh: Sign Curve-sect163r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2058 -v 60 -d ../CA -i req -o Curve-sect163r1-ec.cert -f ../tests.pw
cert.sh: #4384: Sign Curve-sect163r1's EC Request - PASSED
cert.sh: Import Curve-sect163r1's EC Cert --------------------------
certutil -A -n Curve-sect163r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect163r1-ec.cert
cert.sh: #4385: Import Curve-sect163r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r2 --------------------------
certutil -s "CN=Curve-sect163r2, E=Curve-sect163r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4386: Generate EC Cert Request for Curve-sect163r2 - PASSED
cert.sh: Sign Curve-sect163r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2059 -v 60 -d ../CA -i req -o Curve-sect163r2-ec.cert -f ../tests.pw
cert.sh: #4387: Sign Curve-sect163r2's EC Request - PASSED
cert.sh: Import Curve-sect163r2's EC Cert --------------------------
certutil -A -n Curve-sect163r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect163r2-ec.cert
cert.sh: #4388: Import Curve-sect163r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r1 --------------------------
certutil -s "CN=Curve-sect193r1, E=Curve-sect193r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4389: Generate EC Cert Request for Curve-sect193r1 - PASSED
cert.sh: Sign Curve-sect193r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2060 -v 60 -d ../CA -i req -o Curve-sect193r1-ec.cert -f ../tests.pw
cert.sh: #4390: Sign Curve-sect193r1's EC Request - PASSED
cert.sh: Import Curve-sect193r1's EC Cert --------------------------
certutil -A -n Curve-sect193r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect193r1-ec.cert
cert.sh: #4391: Import Curve-sect193r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r2 --------------------------
certutil -s "CN=Curve-sect193r2, E=Curve-sect193r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4392: Generate EC Cert Request for Curve-sect193r2 - PASSED
cert.sh: Sign Curve-sect193r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2061 -v 60 -d ../CA -i req -o Curve-sect193r2-ec.cert -f ../tests.pw
cert.sh: #4393: Sign Curve-sect193r2's EC Request - PASSED
cert.sh: Import Curve-sect193r2's EC Cert --------------------------
certutil -A -n Curve-sect193r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect193r2-ec.cert
cert.sh: #4394: Import Curve-sect193r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233k1 --------------------------
certutil -s "CN=Curve-sect233k1, E=Curve-sect233k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4395: Generate EC Cert Request for Curve-sect233k1 - PASSED
cert.sh: Sign Curve-sect233k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2062 -v 60 -d ../CA -i req -o Curve-sect233k1-ec.cert -f ../tests.pw
cert.sh: #4396: Sign Curve-sect233k1's EC Request - PASSED
cert.sh: Import Curve-sect233k1's EC Cert --------------------------
certutil -A -n Curve-sect233k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect233k1-ec.cert
cert.sh: #4397: Import Curve-sect233k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233r1 --------------------------
certutil -s "CN=Curve-sect233r1, E=Curve-sect233r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4398: Generate EC Cert Request for Curve-sect233r1 - PASSED
cert.sh: Sign Curve-sect233r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2063 -v 60 -d ../CA -i req -o Curve-sect233r1-ec.cert -f ../tests.pw
cert.sh: #4399: Sign Curve-sect233r1's EC Request - PASSED
cert.sh: Import Curve-sect233r1's EC Cert --------------------------
certutil -A -n Curve-sect233r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect233r1-ec.cert
cert.sh: #4400: Import Curve-sect233r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect239k1 --------------------------
certutil -s "CN=Curve-sect239k1, E=Curve-sect239k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect239k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4401: Generate EC Cert Request for Curve-sect239k1 - PASSED
cert.sh: Sign Curve-sect239k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2064 -v 60 -d ../CA -i req -o Curve-sect239k1-ec.cert -f ../tests.pw
cert.sh: #4402: Sign Curve-sect239k1's EC Request - PASSED
cert.sh: Import Curve-sect239k1's EC Cert --------------------------
certutil -A -n Curve-sect239k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect239k1-ec.cert
cert.sh: #4403: Import Curve-sect239k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283k1 --------------------------
certutil -s "CN=Curve-sect283k1, E=Curve-sect283k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4404: Generate EC Cert Request for Curve-sect283k1 - PASSED
cert.sh: Sign Curve-sect283k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2065 -v 60 -d ../CA -i req -o Curve-sect283k1-ec.cert -f ../tests.pw
cert.sh: #4405: Sign Curve-sect283k1's EC Request - PASSED
cert.sh: Import Curve-sect283k1's EC Cert --------------------------
certutil -A -n Curve-sect283k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect283k1-ec.cert
cert.sh: #4406: Import Curve-sect283k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283r1 --------------------------
certutil -s "CN=Curve-sect283r1, E=Curve-sect283r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4407: Generate EC Cert Request for Curve-sect283r1 - PASSED
cert.sh: Sign Curve-sect283r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2066 -v 60 -d ../CA -i req -o Curve-sect283r1-ec.cert -f ../tests.pw
cert.sh: #4408: Sign Curve-sect283r1's EC Request - PASSED
cert.sh: Import Curve-sect283r1's EC Cert --------------------------
certutil -A -n Curve-sect283r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect283r1-ec.cert
cert.sh: #4409: Import Curve-sect283r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409k1 --------------------------
certutil -s "CN=Curve-sect409k1, E=Curve-sect409k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4410: Generate EC Cert Request for Curve-sect409k1 - PASSED
cert.sh: Sign Curve-sect409k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2067 -v 60 -d ../CA -i req -o Curve-sect409k1-ec.cert -f ../tests.pw
cert.sh: #4411: Sign Curve-sect409k1's EC Request - PASSED
cert.sh: Import Curve-sect409k1's EC Cert --------------------------
certutil -A -n Curve-sect409k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect409k1-ec.cert
cert.sh: #4412: Import Curve-sect409k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409r1 --------------------------
certutil -s "CN=Curve-sect409r1, E=Curve-sect409r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4413: Generate EC Cert Request for Curve-sect409r1 - PASSED
cert.sh: Sign Curve-sect409r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2068 -v 60 -d ../CA -i req -o Curve-sect409r1-ec.cert -f ../tests.pw
cert.sh: #4414: Sign Curve-sect409r1's EC Request - PASSED
cert.sh: Import Curve-sect409r1's EC Cert --------------------------
certutil -A -n Curve-sect409r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect409r1-ec.cert
cert.sh: #4415: Import Curve-sect409r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571k1 --------------------------
certutil -s "CN=Curve-sect571k1, E=Curve-sect571k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4416: Generate EC Cert Request for Curve-sect571k1 - PASSED
cert.sh: Sign Curve-sect571k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2069 -v 60 -d ../CA -i req -o Curve-sect571k1-ec.cert -f ../tests.pw
cert.sh: #4417: Sign Curve-sect571k1's EC Request - PASSED
cert.sh: Import Curve-sect571k1's EC Cert --------------------------
certutil -A -n Curve-sect571k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect571k1-ec.cert
cert.sh: #4418: Import Curve-sect571k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571r1 --------------------------
certutil -s "CN=Curve-sect571r1, E=Curve-sect571r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4419: Generate EC Cert Request for Curve-sect571r1 - PASSED
cert.sh: Sign Curve-sect571r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2070 -v 60 -d ../CA -i req -o Curve-sect571r1-ec.cert -f ../tests.pw
cert.sh: #4420: Sign Curve-sect571r1's EC Request - PASSED
cert.sh: Import Curve-sect571r1's EC Cert --------------------------
certutil -A -n Curve-sect571r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect571r1-ec.cert
cert.sh: #4421: Import Curve-sect571r1's EC Cert - PASSED
cert.sh: Initializing TestExt's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw
cert.sh: #4422: Initializing TestExt's Cert DB - PASSED
cert.sh: Loading root cert module to TestExt's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #4423: Loading root cert module to TestExt's Cert DB - PASSED
cert.sh: Import Root CA for TestExt --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert
cert.sh: #4424: Import Root CA for TestExt - PASSED
cert.sh: Import EC Root CA for TestExt --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -i ../CA/TestCA-ec.ca.cert
cert.sh: #4425: Import EC Root CA for TestExt - PASSED
cert.sh: Generate Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4426: Generate Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's Request --------------------------
certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw
cert.sh: #4427: Sign TestExt's Request - PASSED
cert.sh: Import TestExt's Cert --------------------------
certutil -A -n TestExt -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert
cert.sh: #4428: Import TestExt's Cert - PASSED
cert.sh SUCCESS: TestExt's Cert Created
cert.sh: Generate EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4429: Generate EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request --------------------------
certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw
cert.sh: #4430: Sign TestExt's EC Request - PASSED
cert.sh: Import TestExt's EC Cert --------------------------
certutil -A -n TestExt-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ec.cert
cert.sh: #4431: Import TestExt's EC Cert - PASSED
cert.sh SUCCESS: TestExt's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4432: Generate mixed EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw
cert.sh: #4433: Sign TestExt's EC Request with RSA - PASSED
cert.sh: Import TestExt's mixed EC Cert --------------------------
certutil -A -n TestExt-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert
cert.sh: #4434: Import TestExt's mixed EC Cert - PASSED
cert.sh SUCCESS: TestExt's mixed EC Cert Created
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
n
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt1
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:5f:2e
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed Nov 28 00:09:04 2012
Not After : Thu Feb 28 00:09:04 2013
Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d1:d5:83:6a:7d:da:c6:29:9e:03:04:2d:e9:b8:1d:18:
ad:0f:6f:2d:0a:c7:e0:1f:bc:85:cf:28:b5:5e:c7:5b:
06:93:e2:0c:cf:fc:63:4c:95:e9:16:79:d2:45:3a:5e:
c6:4e:3d:98:ef:b5:c3:4b:c0:e3:26:3a:79:8a:56:30:
34:76:72:95:cb:8b:bc:81:2b:a2:db:bd:b4:83:12:83:
30:1f:75:ad:6e:5b:4b:e1:a5:e1:0b:67:4b:0f:7d:14:
f6:e9:3c:d4:9d:c5:47:d6:18:4a:fc:07:b7:cf:55:79:
2f:7a:b8:c8:7a:e6:4f:2e:c5:ff:17:5f:10:dd:aa:21
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Key Usage
Usages: Digital Signature
Non-Repudiation
Key Encipherment
Data Encipherment
Key Agreement
Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
69:8c:aa:90:b4:9e:d1:f4:81:b8:68:eb:91:09:f8:a8:
b2:b7:14:01:e2:d1:c0:aa:97:95:2b:79:b7:02:70:62:
83:03:27:59:a3:46:9d:7b:a2:24:d7:77:54:8b:f9:c0:
07:f2:85:cf:93:34:af:64:80:f0:bd:6c:dd:f4:9f:e8:
d6:c4:cf:2a:0c:03:52:e2:22:71:d5:03:0e:5b:b4:2c:
20:4d:e9:e2:ab:f1:3a:e6:05:29:b7:e1:94:e6:dd:91:
93:fc:79:3b:8f:dc:d5:9c:2c:71:49:86:06:28:90:83:
92:a7:ad:18:e0:f2:83:fe:a1:53:45:a9:f5:f5:20:f0
Fingerprint (MD5):
1D:60:5C:20:74:56:B5:52:66:AC:22:1E:7E:C3:DC:AA
Fingerprint (SHA1):
48:2D:77:8D:94:8C:AD:B9:75:E8:CC:94:B3:45:0B:7B:90:8A:72:18
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #4435: Certificate Key Usage Extension (1) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt2
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:5f:2e
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed Nov 28 00:09:04 2012
Not After : Thu Feb 28 00:09:04 2013
Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
cb:12:91:6f:16:e9:04:e0:3e:34:78:42:6f:c9:c5:c2:
e4:30:b8:df:0d:cd:be:fb:aa:1b:f1:8b:73:60:d4:67:
71:c1:0f:50:77:a1:8f:b5:ad:80:6b:dd:9f:45:75:ca:
b8:4c:39:4e:0f:0e:59:0d:71:fe:20:76:ff:d6:5f:fb:
3e:c2:a7:40:08:ed:ee:da:6d:f7:19:0f:26:9f:c2:60:
0e:35:c3:70:05:f2:6f:03:ae:fa:c1:21:c5:1b:0c:31:
19:bd:d7:a9:ae:44:88:85:55:20:ee:2f:02:7e:0d:67:
7c:91:c0:f7:ef:e0:46:ad:bf:34:40:6b:73:56:d4:57
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Key Usage
Critical: True
Usages: Digital Signature
Non-Repudiation
Key Encipherment
Data Encipherment
Key Agreement
Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
b4:c2:62:15:ad:6e:21:30:a5:39:64:84:f1:ed:6c:3f:
94:cc:28:c4:e9:a5:cc:c8:f6:54:d5:6d:93:ba:07:0b:
73:d3:1b:eb:64:de:99:a6:fc:cb:99:68:01:d1:18:d2:
1b:2d:32:a5:2d:7f:3d:93:02:6c:8d:61:7d:99:bb:1a:
de:f2:c3:6b:14:40:e4:e6:ca:df:09:d1:b1:f2:68:0c:
ed:b3:f9:74:cc:ee:c2:d9:39:f5:8b:87:1e:fc:a6:89:
1e:b7:23:7a:97:a6:3f:69:8f:cd:87:d7:43:ff:ec:d9:
b0:4f:86:7d:5f:d7:37:07:94:b8:4b:f3:1b:c4:65:6e
Fingerprint (MD5):
0E:88:12:87:72:FD:A9:26:DD:D4:25:01:E1:E5:A3:38
Fingerprint (SHA1):
A6:F7:DB:E4:9D:A1:ED:1B:32:9F:C4:E7:F6:E3:F2:5F:1E:FC:35:49
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #4436: Certificate Key Usage Extension (2) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
y
-1
n
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt3
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:5f:2f
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed Nov 28 00:09:05 2012
Not After : Thu Feb 28 00:09:05 2013
Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a6:b4:eb:52:92:eb:dd:91:9f:f0:4b:1b:09:82:b3:8b:
21:14:ee:e8:09:40:6f:bd:e1:f7:95:e9:18:59:69:82:
28:6c:33:c3:ad:af:de:40:98:64:a6:d8:0b:54:bc:68:
29:d5:82:9f:ed:f7:74:86:6b:9c:d5:88:f8:58:4b:2a:
e3:8a:21:e3:41:05:92:27:f8:b0:bb:f7:dc:c7:e7:55:
9b:d2:3f:4a:27:d5:00:18:5f:56:17:70:9f:81:b4:10:
68:89:c8:da:39:dc:31:a7:7a:ac:70:8e:09:20:ca:fa:
9d:81:c9:3e:b9:26:d7:c5:16:72:25:bf:57:9b:e7:33
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
0f:01:41:14:44:c8:62:e4:a2:64:8a:47:a9:36:6c:01:
67:e7:96:eb:1b:4b:3b:07:ea:30:d9:f1:30:33:19:93:
e2:4a:c9:3d:10:51:42:a4:35:36:8a:ef:8e:4e:8f:4f:
c7:b2:76:b0:06:3a:86:f7:cd:d7:52:c5:9b:91:71:14:
76:51:2a:5a:c2:9b:48:a2:42:01:5b:01:76:d4:03:96:
d0:dd:d7:1d:39:fe:63:73:ad:bd:ef:8e:0c:5d:01:35:
c7:f6:64:b7:ef:d8:50:7f:5c:59:00:62:23:50:a2:80:
ca:92:c5:7e:4e:09:0c:71:c7:08:15:ba:7e:ae:93:a1
Fingerprint (MD5):
BE:C6:54:0D:38:4D:D0:77:63:8B:14:B6:FD:6E:37:1A
Fingerprint (SHA1):
AE:94:00:D4:2C:61:06:65:11:64:3D:AB:1E:4D:D6:C3:53:4F:1F:9F
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #4437: Certificate Basic Constraints Extension (3) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
n
-1
y
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt4
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:5f:2f
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed Nov 28 00:09:05 2012
Not After : Thu Feb 28 00:09:05 2013
Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
c6:13:53:75:8e:64:4d:35:ef:f5:c2:08:9a:bb:6b:f0:
06:ab:05:7d:19:39:fe:8e:20:45:af:a7:d1:50:81:46:
86:7f:3f:8e:78:f2:d6:0d:95:f5:54:e0:2d:79:48:c0:
cb:71:97:cf:9b:9f:2d:26:e7:11:c0:91:7c:35:11:2a:
13:77:e4:36:61:ef:2d:ff:f6:97:16:b9:84:ee:71:07:
89:66:cb:50:cf:c7:af:f3:14:81:77:47:68:c8:31:28:
03:f8:f4:8a:2a:35:1d:f3:9b:b4:fe:18:d8:b9:1a:51:
b3:8f:b9:dd:64:08:5e:8e:6d:43:d4:73:37:ff:3b:91
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is not a CA.
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
40:7a:c0:b0:77:03:96:3e:90:72:34:2e:b9:b6:97:69:
65:e5:ef:ca:6e:96:b8:72:ef:0c:d8:a6:d2:b4:67:f1:
6f:84:52:3d:e6:1d:1c:9e:26:cc:de:53:ae:fc:ed:78:
9e:f0:cb:70:48:34:c1:30:a6:a3:6f:f7:2b:08:ce:73:
4f:11:f5:cf:ff:2d:0d:0b:6e:1c:65:b6:55:7a:51:b8:
85:d2:36:4c:5c:37:d7:31:db:da:b5:64:20:69:74:8c:
5e:67:04:5c:5a:9b:61:1e:77:73:a3:27:ca:61:57:2e:
55:3e:5f:fc:70:60:48:69:5e:08:8b:05:d0:98:40:63
Fingerprint (MD5):
BD:A9:73:BB:73:E5:8B:DD:74:91:26:F4:8D:11:5D:C4
Fingerprint (SHA1):
71:D2:92:0E:ED:E6:F9:EE:5D:93:B9:3F:16:BD:0E:0B:69:A5:CD:76
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #4438: Certificate Basic Constraints Extension (4) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
y
12341235123
y
Generating key. This may take a few moments...
Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt5
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:5f:30
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed Nov 28 00:09:05 2012
Not After : Thu Feb 28 00:09:05 2013
Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
db:3b:6d:05:26:12:4b:29:b5:47:34:ab:3c:ec:7c:19:
33:85:27:5f:ea:e2:e8:8e:23:0c:1e:c1:7c:c3:58:5a:
bf:72:62:17:b1:b5:d3:8d:ca:2e:72:96:e1:15:e8:71:
88:c9:1d:8a:d6:91:db:e1:54:dd:f0:ba:59:12:1a:5c:
f2:c6:0f:2b:40:0d:23:8c:61:e5:4b:48:e2:2b:63:4d:
21:7b:f5:d1:bb:95:f6:60:21:9e:fb:ef:9f:b7:56:a7:
ee:84:3b:f6:9e:7d:5b:d7:50:71:09:78:87:b1:71:38:
e9:5b:34:da:5d:b1:e5:ec:59:f6:8c:2b:a4:e9:83:45
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Authority Key Identifier
Critical: True
Key ID:
12341235123
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
8b:e4:87:0f:ad:6e:6c:f1:7f:0d:88:f1:7f:5f:52:eb:
08:88:ed:0e:68:f5:1b:e6:61:f8:2a:5b:8d:e7:28:95:
6a:17:40:39:3f:a7:45:a5:80:0b:cb:ca:e4:e5:4b:8e:
27:4c:25:e5:c7:eb:a3:2e:48:21:be:1b:c5:d5:21:8e:
7c:aa:83:06:48:df:cb:c6:70:45:e2:55:2b:8e:7c:b0:
9c:4b:82:9d:9b:0c:6d:32:f6:2a:f0:52:a3:4f:39:e9:
5f:98:e4:e7:38:e9:94:9e:c7:09:91:53:6a:d0:29:a8:
a8:63:d6:d5:c5:00:c2:cb:87:42:72:9a:84:17:55:5c
Fingerprint (MD5):
C4:81:B8:74:10:3D:07:BE:D2:18:65:69:2D:8C:D0:88
Fingerprint (SHA1):
22:CB:37:C0:3A:B9:23:7D:86:EA:E9:D3:01:1C:89:C9:E9:6C:27:CA
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #4439: Certificate Authority Key Identifier Extension (5) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
y
3
test.com
214123
y
Generating key. This may take a few moments...
Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt6
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:5f:31
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed Nov 28 00:09:06 2012
Not After : Thu Feb 28 00:09:06 2013
Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
c8:d2:a8:34:72:95:3e:62:d0:92:40:ee:de:08:c8:7e:
4f:05:21:bf:18:a5:6c:26:6b:4e:1d:0f:12:dc:98:fa:
ab:2c:8d:52:2d:40:db:a4:47:57:3e:25:cd:7e:73:6a:
e8:22:6e:8a:a2:b6:7f:66:60:fd:b7:56:e1:05:cf:2e:
cb:71:67:bf:0b:fb:6c:d0:bf:e3:a8:35:76:c4:14:93:
e6:55:5c:70:3d:6a:0e:5f:0b:a5:c1:0e:a2:dc:f8:2c:
54:b4:02:fa:51:5c:fd:fe:32:c3:36:a9:cc:0b:88:8c:
34:b7:ae:9e:dc:70:75:88:0d:30:69:fd:0b:b3:bb:db
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Authority Key Identifier
Critical: True
Issuer:
DNS name: "test.com"
Serial Number:
214123
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
3d:07:c5:84:73:7f:7b:16:19:91:19:6e:b8:02:4b:53:
eb:d5:5f:09:0b:e4:0a:07:db:a4:38:c1:ab:05:2f:af:
b3:e5:82:bb:98:f3:d9:3d:22:92:49:3e:1e:bb:53:7b:
29:fe:2c:5e:5d:41:17:6c:2c:1b:30:db:a2:ef:1e:36:
bd:60:93:68:85:6b:80:84:86:16:1e:91:4b:84:9a:a7:
06:3f:32:79:60:d1:0b:ed:29:ff:75:35:a4:e2:d2:90:
01:0e:94:ae:7d:de:86:4b:70:dd:b5:49:6d:2c:3f:29:
bb:40:e3:a3:a2:40:e1:dd:48:0e:ff:5d:8a:19:58:ea
Fingerprint (MD5):
7D:F4:46:76:86:AB:7E:D2:A7:E7:85:CF:F4:D2:0C:47
Fingerprint (SHA1):
7A:49:7F:56:46:6A:3C:75:07:D4:F0:C1:6E:C1:35:87:4B:6F:02:B1
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #4440: Certificate Authority Key Identifier Extension (6) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
1
2
rfc822@name.tld
3
test.com
8
1.2.3.4
9
OID.0.2.213
10
0
10
n
n
Generating key. This may take a few moments...
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice: >
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice: > Enter value for the CRL Issuer name:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt7
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:5f:31
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed Nov 28 00:09:06 2012
Not After : Thu Feb 28 00:09:06 2013
Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b7:d8:bb:81:a7:3c:87:53:cc:8f:15:3b:e4:5d:f3:02:
44:8f:69:2c:3d:6d:b0:e0:64:52:8b:10:29:32:06:98:
b2:6b:c6:76:c8:b3:99:3f:27:a9:ea:a1:da:eb:99:80:
73:1a:3a:57:eb:23:e3:87:04:bd:13:50:22:68:ed:8f:
c5:53:47:d1:05:5b:25:81:22:6a:66:d3:dc:4e:dc:d7:
9d:cd:49:07:ce:1c:bd:f5:74:64:8c:e2:aa:28:a2:1e:
0f:3d:ce:27:8a:fa:cc:d7:fd:3c:a3:a9:c5:7d:0b:62:
5d:2e:bb:d8:d7:6d:34:a1:c4:31:7f:fc:db:74:66:7b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: CRL Distribution Points
Distribution point:
RFC822 Name: "rfc822@name.tld"
DNS name: "test.com"
IP Address:
87:07:31:2e:32:2e:33:2e:34
Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51
Reasons:
80
(7 least significant bits unused)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
96:ba:65:59:68:e3:98:bf:ed:a0:e4:dc:cf:e4:f9:ae:
98:d2:12:60:85:d3:ec:70:a5:ed:bd:ee:1a:a9:a3:b4:
90:88:40:3f:69:14:2a:7f:25:b0:4d:bf:a8:29:b2:e7:
dc:4f:09:c4:96:e5:b2:4c:0f:bb:b9:3e:5b:1c:00:5e:
6f:93:ea:81:00:66:e4:44:93:f5:e8:9d:c3:87:44:9d:
91:df:42:fe:a3:77:e9:ac:94:93:af:0c:3a:09:83:23:
05:aa:fc:d7:47:2a:83:79:3b:83:89:01:fd:7c:a8:74:
85:f2:88:2d:79:02:f3:a1:b3:c9:ea:90:e2:50:bf:14
Fingerprint (MD5):
76:2F:F5:9A:24:EE:94:75:80:1F:CD:CF:3F:52:71:1C
Fingerprint (SHA1):
F5:F8:43:56:E2:83:26:34:CB:9A:66:FB:BF:3E:39:F0:65:0E:79:87
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #4441: CRL Distribution Points Extension (7) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
2
SN=asdfsdf
4
3
test.com
10
n
n
Generating key. This may take a few moments...
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice: > Enter the relative name:
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice: > Enter value for the CRL Issuer name:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt8
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:5f:32
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed Nov 28 00:09:06 2012
Not After : Thu Feb 28 00:09:06 2013
Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
c7:3b:05:05:db:07:79:52:5d:99:4f:2f:bc:81:ee:9d:
8c:e9:49:55:70:c5:50:f3:48:bf:61:ab:92:ca:d3:99:
3b:38:79:69:21:d2:30:26:43:d4:8d:e0:77:ce:37:fc:
65:74:c6:53:d8:e6:1d:82:6d:8e:9c:7e:a8:85:41:39:
ba:9c:e5:b9:4d:92:5c:a7:62:b4:6a:b4:a1:a5:fc:54:
5e:46:f8:e9:8e:87:9b:cc:0e:40:c7:20:9f:39:3a:d3:
2b:64:d8:c4:d3:ec:a8:22:8a:9b:77:17:d8:a4:8f:b7:
f8:3c:71:d3:5b:ef:06:24:36:87:19:92:b1:6b:15:1b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: CRL Distribution Points
Distribution point:
RDN: "SN=asdfsdf"
Reasons:
08
(7 least significant bits unused)
CRL issuer:
DNS name: "test.com"
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
4c:c6:39:69:4b:e5:e7:62:2d:20:84:bc:9f:47:b3:aa:
f3:21:27:0b:e7:21:24:43:6e:3c:42:69:dc:14:70:7c:
9b:3c:3e:04:07:86:9b:63:c4:7f:51:7f:26:45:b8:2f:
a7:da:91:70:2e:4a:34:6b:d8:0d:c8:fc:b6:cd:12:b2:
d6:58:88:55:3b:1f:3c:06:24:06:01:9f:ea:59:a4:6a:
ed:32:e3:23:dd:b8:5d:7f:de:9b:5b:07:72:17:e1:c7:
b3:61:07:e0:c6:95:12:fc:05:e1:40:db:81:58:c2:7e:
de:11:be:3e:51:8c:27:0c:3c:5c:4a:2b:03:26:e4:8b
Fingerprint (MD5):
27:9B:29:87:17:E2:A7:1E:85:73:6C:5F:88:EF:9B:72
Fingerprint (SHA1):
03:FB:F1:EB:BC:A7:0A:04:B1:B0:6B:FD:56:E8:F3:93:1F:10:91:7C
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #4442: CRL Distribution Points Extension (8) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
0
1
2
10
n
Generating key. This may take a few moments...
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt9
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:5f:33
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed Nov 28 00:09:07 2012
Not After : Thu Feb 28 00:09:07 2013
Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
aa:66:33:39:59:47:15:07:91:4d:fd:bb:37:5c:64:21:
03:bd:fb:b3:3f:ef:82:f3:a0:f7:d4:3e:1e:ff:d8:d4:
27:90:69:54:f3:86:9c:7b:8c:89:1a:99:50:9c:86:4a:
c3:c5:99:25:e3:a1:f0:26:f3:ef:3a:70:f1:92:8d:ff:
2b:82:49:5b:db:4b:a3:e4:65:ce:c3:00:58:42:bd:a8:
8e:a7:10:21:23:a0:ac:ba:55:76:1c:3a:56:b8:cb:c0:
27:b3:26:64:9b:ea:b6:6a:b7:01:af:1c:f5:3b:cd:fa:
5e:89:60:50:b4:87:36:95:78:18:63:36:42:30:b9:d7
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL Client,SSL Server,S/MIME>
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
63:39:18:ba:48:45:fb:c0:3a:16:79:6c:3e:b1:16:29:
72:8b:28:d4:b1:c6:76:f8:c6:0d:7d:54:5f:77:a7:97:
d5:a1:d7:07:fc:1f:b6:18:04:d7:f9:36:36:8e:4c:1b:
f1:3f:31:1f:5e:ad:51:1a:5a:7c:36:83:aa:da:8c:7f:
1b:08:f3:63:4e:a1:37:ad:be:27:33:0c:0e:e3:dc:ac:
bc:fa:ef:a1:06:e8:e1:5e:87:6c:0e:8b:34:16:00:6f:
cd:0a:d4:02:53:89:cb:7c:0d:55:86:c5:b3:77:3e:3d:
b4:59:78:8d:c7:bd:f7:c7:b2:bc:da:63:3d:f3:cf:8d
Fingerprint (MD5):
6F:78:A2:25:72:38:C1:41:C5:98:9A:A2:EB:7A:BE:75
Fingerprint (SHA1):
49:38:0B:54:11:CA:A6:7D:64:8C:67:C8:9D:A9:64:43:87:19:C6:DD
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #4443: Certificate Type Extension (9) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y
Generating key. This may take a few moments...
0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
> Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt10
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:5f:33
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi
ew,ST=California,C=US"
Validity:
Not Before: Wed Nov 28 00:09:07 2012
Not After : Thu Feb 28 00:09:07 2013
Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V
iew,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a5:7f:c9:ab:cb:65:91:16:ef:ee:c6:a3:87:9e:8f:b1:
68:14:4f:91:af:1d:0d:30:cd:18:c5:07:b6:ad:af:b4:
bc:e8:39:05:04:8d:3b:1d:67:75:a1:cd:bd:2c:20:1d:
1a:74:97:27:f6:e4:25:86:b8:8e:00:eb:d2:68:92:d1:
61:8d:2c:65:a1:e6:ce:be:dc:b8:aa:eb:c9:cc:9e:de:
75:65:26:58:29:32:0e:f8:01:f5:29:24:30:9d:d8:51:
00:82:7a:36:59:62:18:7e:53:57:cc:21:c1:ea:73:5d:
d6:0b:b5:5f:dc:41:92:a0:cb:4d:dd:c0:d2:e5:0a:e3
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Extended Key Usage
Critical: True
TLS Web Server Authentication Certificate
TLS Web Client Authentication Certificate
Code Signing Certificate
E-Mail Protection Certificate
Time Stamping Certifcate
OCSP Responder Certificate
Strong Crypto Export Approved
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
a3:b9:28:83:20:ce:37:73:27:dd:7a:21:ac:0c:46:44:
2a:38:4b:6d:93:36:c9:06:13:ef:01:de:64:e6:06:03:
58:21:ed:ab:61:77:51:8a:ff:e8:e5:a2:61:10:6a:6e:
de:07:a6:15:91:c8:6e:48:ec:de:fb:10:a7:39:4a:b3:
b0:68:0b:42:ec:4e:59:80:8d:62:32:04:6b:c8:00:41:
06:c0:90:be:21:b7:6d:77:81:c3:d0:c6:1e:78:00:6d:
70:51:90:a1:c3:1b:12:75:54:8e:0f:b9:0b:73:2a:73:
39:e3:f2:65:65:fd:33:64:92:a8:25:2e:e5:fb:de:ef
Fingerprint (MD5):
0D:72:64:2D:74:E5:53:0F:60:4C:07:0B:E5:AF:6F:72
Fingerprint (SHA1):
A8:D8:7F:31:BD:5C:F0:3B:F0:61:00:D4:37:44:6C:62:F3:C5:9E:B9
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #4444: Extended Key Usage Extension (10) - PASSED
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
1
2
3
4
5
6
10
n
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt11
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:99:f0:5f:34
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi
ew,ST=California,C=US"
Validity:
Not Before: Wed Nov 28 00:09:08 2012
Not After : Thu Feb 28 00:09:08 2013
Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V
iew,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
c6:16:9e:de:12:36:f8:a8:e3:f3:6a:48:ec:0b:f4:b9:
2b:dd:31:fc:e2:ad:c6:22:f0:a8:5f:0c:3a:82:54:4b:
b0:7a:6f:81:93:b6:76:6b:b0:f6:e6:0b:8e:17:13:a0:
6f:b7:88:7f:72:c9:f9:0b:f6:d3:17:1f:f6:1e:1c:10:
ed:58:2a:2f:b0:d4:65:fa:fc:4c:11:a9:7e:5a:74:7e:
29:68:6a:ef:cd:74:77:64:a6:92:3e:dd:62:77:e3:8f:
d9:cc:ff:0c:dc:5e:7e:6e:84:bd:8f:60:6d:8f:41:34:
e4:8f:e2:51:60:fe:ce:8f:ab:93:d2:60:1b:3c:02:51
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Key Usage
Usages: Non-Repudiation
Key Encipherment
Data Encipherment
Key Agreement
Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
73:f6:68:89:71:5a:ba:d7:2c:84:95:94:c5:b4:74:4c:
6d:8b:87:8a:69:2d:b6:8c:14:bf:26:14:42:91:94:2e:
96:a9:5d:f8:78:ce:4c:0f:8f:e4:ac:13:44:af:fb:00:
87:69:e7:e2:6d:2e:13:48:f2:58:f6:58:c0:a9:a7:24:
44:63:05:bd:67:33:86:31:b6:50:a8:7c:51:cd:0e:69:
88:f7:7d:30:a7:37:90:cc:dc:7f:55:73:32:b5:97:a3:
68:07:13:65:9d:f7:89:fa:6c:1d:51:eb:a4:52:8c:65:
bd:42:1f:9d:cb:a2:84:2f:5d:32:7b:df:fe:95:be:6a
Fingerprint (MD5):
69:93:61:B9:D1:88:84:39:F6:0F:24:34:B8:F5:03:CC
Fingerprint (SHA1):
3D:43:9C:9A:99:E0:5F:7C:5D:58:47:35:AD:03:47:41:C4:F1:69:B6
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #4445: Certificate Key Usage Extension (11) - PASSED
cert.sh: Create A Password Test Cert ==============
cert.sh: Create A Password Test Ca --------
cert.sh: Creating a CA Certificate PasswordCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dbpass
cert.sh: Creating CA Cert DB --------------------------
certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -f ../tests.pw
cert.sh: #4446: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dbpass
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #4447: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert PasswordCA --------------------------
certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #4448: Creating CA Cert PasswordCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n PasswordCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -o root.cert
cert.sh: #4449: Exporting Root Cert - PASSED
cert.sh: Changing password on Password Test Cert's Cert DB --------------------------
certutil -W -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw
Password changed successfully.
cert.sh: #4450: Changing password on Password Test Cert's Cert DB - PASSED
cert.sh: Generate Certificate for Password Test Cert with new password --------------------------
certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise
Generating key. This may take a few moments...
cert.sh: #4451: Generate Certificate for Password Test Cert with new password - PASSED
cert.sh SUCCESS: PASSWORD passed
cert.sh: Verify Certificate for Password Test Cert with new password --------------------------
certutil -V -n PasswordCert -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -f ../tests.fipspw
certutil: certificate is valid
cert.sh: #4452: Verify Certificate for Password Test Cert with new password - PASSED
cert.sh: Creating Distrusted Certificate
cert.sh: Initializing Distrusted's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
cert.sh: #4453: Initializing Distrusted's Cert DB - PASSED
cert.sh: Loading root cert module to Distrusted's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #4454: Loading root cert module to Distrusted's Cert DB - PASSED
cert.sh: Import Root CA for Distrusted --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -i ../CA/TestCA.ca.cert
cert.sh: #4455: Import Root CA for Distrusted - PASSED
cert.sh: Import EC Root CA for Distrusted --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -i ../CA/TestCA-ec.ca.cert
cert.sh: #4456: Import EC Root CA for Distrusted - PASSED
cert.sh: Generate Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4457: Generate Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's Request --------------------------
certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw
cert.sh: #4458: Sign Distrusted's Request - PASSED
cert.sh: Import Distrusted's Cert --------------------------
certutil -A -n Distrusted -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -i Distrusted.cert
cert.sh: #4459: Import Distrusted's Cert - PASSED
cert.sh SUCCESS: Distrusted's Cert Created
cert.sh: Generate EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4460: Generate EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request --------------------------
certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw
cert.sh: #4461: Sign Distrusted's EC Request - PASSED
cert.sh: Import Distrusted's EC Cert --------------------------
certutil -A -n Distrusted-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -i Distrusted-ec.cert
cert.sh: #4462: Import Distrusted's EC Cert - PASSED
cert.sh SUCCESS: Distrusted's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4463: Generate mixed EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request with RSA --------------------------
certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw
cert.sh: #4464: Sign Distrusted's EC Request with RSA - PASSED
cert.sh: Import Distrusted's mixed EC Cert --------------------------
certutil -A -n Distrusted-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -i Distrusted-ecmixed.cert
cert.sh: #4465: Import Distrusted's mixed EC Cert - PASSED
cert.sh SUCCESS: Distrusted's mixed EC Cert Created
cert.sh: Mark CERT as unstrusted --------------------------
certutil -M -n Distrusted -t p,p,p -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
cert.sh: #4466: Mark CERT as unstrusted - PASSED
cert.sh: Creating Distrusted Intermediate
cert.sh: Creating a CA Certificate DistrustedCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA
cert.sh: Creating CA Cert DistrustedCA --------------------------
certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #4467: Creating CA Cert DistrustedCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n DistrustedCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -o root.cert
cert.sh: #4468: Exporting Root Cert - PASSED
cert.sh: Import Distrusted Intermediate --------------------------
certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert
cert.sh: #4469: Import Distrusted Intermediate - PASSED
cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA --------------------------
certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4470: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED
cp: `./req' and `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA/req' are the same file
cert.sh: Sign LeafChainedToDistrustedCA's Request --------------------------
certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw
cert.sh: #4471: Sign LeafChainedToDistrustedCA's Request - PASSED
cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u --------------------------
certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert
cert.sh: #4472: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server --------------------------
certutil -V -n LeafChainedToDistrustedCA -u V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4473: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client --------------------------
certutil -V -n LeafChainedToDistrustedCA -u C -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4474: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4475: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient --------------------------
certutil -V -n LeafChainedToDistrustedCA -u R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4476: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder --------------------------
certutil -V -n LeafChainedToDistrustedCA -u O -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #4477: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u J -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #4478: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED
cert.sh: Verify Distrusted Cert for SSL Server --------------------------
certutil -V -n Distrusted -u V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4479: Verify Distrusted Cert for SSL Server - PASSED
cert.sh: Verify Distrusted Cert for SSL Client --------------------------
certutil -V -n Distrusted -u C -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4480: Verify Distrusted Cert for SSL Client - PASSED
cert.sh: Verify Distrusted Cert for Email signer --------------------------
certutil -V -n Distrusted -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4481: Verify Distrusted Cert for Email signer - PASSED
cert.sh: Verify Distrusted Cert for Email recipient --------------------------
certutil -V -n Distrusted -u R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4482: Verify Distrusted Cert for Email recipient - PASSED
cert.sh: Verify Distrusted Cert for OCSP responder --------------------------
certutil -V -n Distrusted -u O -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #4483: Verify Distrusted Cert for OCSP responder - PASSED
cert.sh: Verify Distrusted Cert for Object Signer --------------------------
certutil -V -n Distrusted -u J -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4484: Verify Distrusted Cert for Object Signer - PASSED
cert.sh: OCSP response creation selftest
cert.sh: perform selftest --------------------------
ocspresp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA serverCA chain-1-serverCA -f ../tests.pw
cert.sh: #4485: perform selftest - PASSED
cert.sh: Creating Client CA Issued Certificates Range 40 - 52 ===
cert.sh: Generate Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4486: Generate Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw
cert.sh: #4487: Sign TestUser40's Request - PASSED
cert.sh: Import TestUser40's Cert --------------------------
certutil -A -n TestUser40 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser40.cert
cert.sh: #4488: Import TestUser40's Cert - PASSED
cert.sh SUCCESS: TestUser40's Cert Created
cert.sh: Generate EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4489: Generate EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw
cert.sh: #4490: Sign TestUser40's EC Request - PASSED
cert.sh: Import TestUser40's EC Cert --------------------------
certutil -A -n TestUser40-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser40-ec.cert
cert.sh: #4491: Import TestUser40's EC Cert - PASSED
cert.sh SUCCESS: TestUser40's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4492: Generate mixed EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw
cert.sh: #4493: Sign TestUser40's EC Request with RSA - PASSED
cert.sh: Import TestUser40's mixed EC Cert --------------------------
certutil -A -n TestUser40-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser40-ecmixed.cert
cert.sh: #4494: Import TestUser40's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser40's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4495: Generate Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's Request --------------------------
certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw
cert.sh: #4496: Sign TestUser41's Request - PASSED
cert.sh: Import TestUser41's Cert --------------------------
certutil -A -n TestUser41 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser41.cert
cert.sh: #4497: Import TestUser41's Cert - PASSED
cert.sh SUCCESS: TestUser41's Cert Created
cert.sh: Generate EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4498: Generate EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request --------------------------
certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw
cert.sh: #4499: Sign TestUser41's EC Request - PASSED
cert.sh: Import TestUser41's EC Cert --------------------------
certutil -A -n TestUser41-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser41-ec.cert
cert.sh: #4500: Import TestUser41's EC Cert - PASSED
cert.sh SUCCESS: TestUser41's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4501: Generate mixed EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw
cert.sh: #4502: Sign TestUser41's EC Request with RSA - PASSED
cert.sh: Import TestUser41's mixed EC Cert --------------------------
certutil -A -n TestUser41-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser41-ecmixed.cert
cert.sh: #4503: Import TestUser41's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser41's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4504: Generate Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's Request --------------------------
certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw
cert.sh: #4505: Sign TestUser42's Request - PASSED
cert.sh: Import TestUser42's Cert --------------------------
certutil -A -n TestUser42 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser42.cert
cert.sh: #4506: Import TestUser42's Cert - PASSED
cert.sh SUCCESS: TestUser42's Cert Created
cert.sh: Generate EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4507: Generate EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request --------------------------
certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw
cert.sh: #4508: Sign TestUser42's EC Request - PASSED
cert.sh: Import TestUser42's EC Cert --------------------------
certutil -A -n TestUser42-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser42-ec.cert
cert.sh: #4509: Import TestUser42's EC Cert - PASSED
cert.sh SUCCESS: TestUser42's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4510: Generate mixed EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw
cert.sh: #4511: Sign TestUser42's EC Request with RSA - PASSED
cert.sh: Import TestUser42's mixed EC Cert --------------------------
certutil -A -n TestUser42-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser42-ecmixed.cert
cert.sh: #4512: Import TestUser42's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser42's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4513: Generate Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's Request --------------------------
certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw
cert.sh: #4514: Sign TestUser43's Request - PASSED
cert.sh: Import TestUser43's Cert --------------------------
certutil -A -n TestUser43 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser43.cert
cert.sh: #4515: Import TestUser43's Cert - PASSED
cert.sh SUCCESS: TestUser43's Cert Created
cert.sh: Generate EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4516: Generate EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request --------------------------
certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw
cert.sh: #4517: Sign TestUser43's EC Request - PASSED
cert.sh: Import TestUser43's EC Cert --------------------------
certutil -A -n TestUser43-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser43-ec.cert
cert.sh: #4518: Import TestUser43's EC Cert - PASSED
cert.sh SUCCESS: TestUser43's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4519: Generate mixed EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw
cert.sh: #4520: Sign TestUser43's EC Request with RSA - PASSED
cert.sh: Import TestUser43's mixed EC Cert --------------------------
certutil -A -n TestUser43-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser43-ecmixed.cert
cert.sh: #4521: Import TestUser43's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser43's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4522: Generate Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's Request --------------------------
certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw
cert.sh: #4523: Sign TestUser44's Request - PASSED
cert.sh: Import TestUser44's Cert --------------------------
certutil -A -n TestUser44 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser44.cert
cert.sh: #4524: Import TestUser44's Cert - PASSED
cert.sh SUCCESS: TestUser44's Cert Created
cert.sh: Generate EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4525: Generate EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request --------------------------
certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw
cert.sh: #4526: Sign TestUser44's EC Request - PASSED
cert.sh: Import TestUser44's EC Cert --------------------------
certutil -A -n TestUser44-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser44-ec.cert
cert.sh: #4527: Import TestUser44's EC Cert - PASSED
cert.sh SUCCESS: TestUser44's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4528: Generate mixed EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw
cert.sh: #4529: Sign TestUser44's EC Request with RSA - PASSED
cert.sh: Import TestUser44's mixed EC Cert --------------------------
certutil -A -n TestUser44-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser44-ecmixed.cert
cert.sh: #4530: Import TestUser44's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser44's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4531: Generate Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's Request --------------------------
certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw
cert.sh: #4532: Sign TestUser45's Request - PASSED
cert.sh: Import TestUser45's Cert --------------------------
certutil -A -n TestUser45 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser45.cert
cert.sh: #4533: Import TestUser45's Cert - PASSED
cert.sh SUCCESS: TestUser45's Cert Created
cert.sh: Generate EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4534: Generate EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request --------------------------
certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw
cert.sh: #4535: Sign TestUser45's EC Request - PASSED
cert.sh: Import TestUser45's EC Cert --------------------------
certutil -A -n TestUser45-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser45-ec.cert
cert.sh: #4536: Import TestUser45's EC Cert - PASSED
cert.sh SUCCESS: TestUser45's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4537: Generate mixed EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw
cert.sh: #4538: Sign TestUser45's EC Request with RSA - PASSED
cert.sh: Import TestUser45's mixed EC Cert --------------------------
certutil -A -n TestUser45-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser45-ecmixed.cert
cert.sh: #4539: Import TestUser45's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser45's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4540: Generate Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's Request --------------------------
certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw
cert.sh: #4541: Sign TestUser46's Request - PASSED
cert.sh: Import TestUser46's Cert --------------------------
certutil -A -n TestUser46 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser46.cert
cert.sh: #4542: Import TestUser46's Cert - PASSED
cert.sh SUCCESS: TestUser46's Cert Created
cert.sh: Generate EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4543: Generate EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request --------------------------
certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw
cert.sh: #4544: Sign TestUser46's EC Request - PASSED
cert.sh: Import TestUser46's EC Cert --------------------------
certutil -A -n TestUser46-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser46-ec.cert
cert.sh: #4545: Import TestUser46's EC Cert - PASSED
cert.sh SUCCESS: TestUser46's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4546: Generate mixed EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw
cert.sh: #4547: Sign TestUser46's EC Request with RSA - PASSED
cert.sh: Import TestUser46's mixed EC Cert --------------------------
certutil -A -n TestUser46-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser46-ecmixed.cert
cert.sh: #4548: Import TestUser46's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser46's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4549: Generate Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's Request --------------------------
certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw
cert.sh: #4550: Sign TestUser47's Request - PASSED
cert.sh: Import TestUser47's Cert --------------------------
certutil -A -n TestUser47 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser47.cert
cert.sh: #4551: Import TestUser47's Cert - PASSED
cert.sh SUCCESS: TestUser47's Cert Created
cert.sh: Generate EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4552: Generate EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request --------------------------
certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw
cert.sh: #4553: Sign TestUser47's EC Request - PASSED
cert.sh: Import TestUser47's EC Cert --------------------------
certutil -A -n TestUser47-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser47-ec.cert
cert.sh: #4554: Import TestUser47's EC Cert - PASSED
cert.sh SUCCESS: TestUser47's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4555: Generate mixed EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw
cert.sh: #4556: Sign TestUser47's EC Request with RSA - PASSED
cert.sh: Import TestUser47's mixed EC Cert --------------------------
certutil -A -n TestUser47-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser47-ecmixed.cert
cert.sh: #4557: Import TestUser47's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser47's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4558: Generate Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's Request --------------------------
certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw
cert.sh: #4559: Sign TestUser48's Request - PASSED
cert.sh: Import TestUser48's Cert --------------------------
certutil -A -n TestUser48 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser48.cert
cert.sh: #4560: Import TestUser48's Cert - PASSED
cert.sh SUCCESS: TestUser48's Cert Created
cert.sh: Generate EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4561: Generate EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request --------------------------
certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw
cert.sh: #4562: Sign TestUser48's EC Request - PASSED
cert.sh: Import TestUser48's EC Cert --------------------------
certutil -A -n TestUser48-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser48-ec.cert
cert.sh: #4563: Import TestUser48's EC Cert - PASSED
cert.sh SUCCESS: TestUser48's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4564: Generate mixed EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw
cert.sh: #4565: Sign TestUser48's EC Request with RSA - PASSED
cert.sh: Import TestUser48's mixed EC Cert --------------------------
certutil -A -n TestUser48-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser48-ecmixed.cert
cert.sh: #4566: Import TestUser48's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser48's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4567: Generate Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's Request --------------------------
certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw
cert.sh: #4568: Sign TestUser49's Request - PASSED
cert.sh: Import TestUser49's Cert --------------------------
certutil -A -n TestUser49 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser49.cert
cert.sh: #4569: Import TestUser49's Cert - PASSED
cert.sh SUCCESS: TestUser49's Cert Created
cert.sh: Generate EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4570: Generate EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request --------------------------
certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw
cert.sh: #4571: Sign TestUser49's EC Request - PASSED
cert.sh: Import TestUser49's EC Cert --------------------------
certutil -A -n TestUser49-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser49-ec.cert
cert.sh: #4572: Import TestUser49's EC Cert - PASSED
cert.sh SUCCESS: TestUser49's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4573: Generate mixed EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw
cert.sh: #4574: Sign TestUser49's EC Request with RSA - PASSED
cert.sh: Import TestUser49's mixed EC Cert --------------------------
certutil -A -n TestUser49-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser49-ecmixed.cert
cert.sh: #4575: Import TestUser49's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser49's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4576: Generate Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw
cert.sh: #4577: Sign TestUser50's Request - PASSED
cert.sh: Import TestUser50's Cert --------------------------
certutil -A -n TestUser50 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser50.cert
cert.sh: #4578: Import TestUser50's Cert - PASSED
cert.sh SUCCESS: TestUser50's Cert Created
cert.sh: Generate EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4579: Generate EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw
cert.sh: #4580: Sign TestUser50's EC Request - PASSED
cert.sh: Import TestUser50's EC Cert --------------------------
certutil -A -n TestUser50-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser50-ec.cert
cert.sh: #4581: Import TestUser50's EC Cert - PASSED
cert.sh SUCCESS: TestUser50's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4582: Generate mixed EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw
cert.sh: #4583: Sign TestUser50's EC Request with RSA - PASSED
cert.sh: Import TestUser50's mixed EC Cert --------------------------
certutil -A -n TestUser50-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser50-ecmixed.cert
cert.sh: #4584: Import TestUser50's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser50's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4585: Generate Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's Request --------------------------
certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw
cert.sh: #4586: Sign TestUser51's Request - PASSED
cert.sh: Import TestUser51's Cert --------------------------
certutil -A -n TestUser51 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser51.cert
cert.sh: #4587: Import TestUser51's Cert - PASSED
cert.sh SUCCESS: TestUser51's Cert Created
cert.sh: Generate EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4588: Generate EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request --------------------------
certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw
cert.sh: #4589: Sign TestUser51's EC Request - PASSED
cert.sh: Import TestUser51's EC Cert --------------------------
certutil -A -n TestUser51-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser51-ec.cert
cert.sh: #4590: Import TestUser51's EC Cert - PASSED
cert.sh SUCCESS: TestUser51's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4591: Generate mixed EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw
cert.sh: #4592: Sign TestUser51's EC Request with RSA - PASSED
cert.sh: Import TestUser51's mixed EC Cert --------------------------
certutil -A -n TestUser51-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser51-ecmixed.cert
cert.sh: #4593: Import TestUser51's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser51's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4594: Generate Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's Request --------------------------
certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw
cert.sh: #4595: Sign TestUser52's Request - PASSED
cert.sh: Import TestUser52's Cert --------------------------
certutil -A -n TestUser52 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser52.cert
cert.sh: #4596: Import TestUser52's Cert - PASSED
cert.sh SUCCESS: TestUser52's Cert Created
cert.sh: Generate EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4597: Generate EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request --------------------------
certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw
cert.sh: #4598: Sign TestUser52's EC Request - PASSED
cert.sh: Import TestUser52's EC Cert --------------------------
certutil -A -n TestUser52-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser52-ec.cert
cert.sh: #4599: Import TestUser52's EC Cert - PASSED
cert.sh SUCCESS: TestUser52's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #4600: Generate mixed EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw
cert.sh: #4601: Sign TestUser52's EC Request with RSA - PASSED
cert.sh: Import TestUser52's mixed EC Cert --------------------------
certutil -A -n TestUser52-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser52-ecmixed.cert
cert.sh: #4602: Import TestUser52's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser52's mixed EC Cert Created
cert.sh: Creating CA CRL =====================================
cert.sh: Generating CRL for range 40-42 TestCA authority --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or
cert.sh: #4603: Generating CRL for range 40-42 TestCA authority - PASSED
cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority --------------------------
crlutil -q -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec
cert.sh: #4604: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED
cert.sh: Modifying CA CRL by adding one more cert ============
cert.sh: Modify CRL by adding one more cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or
cert.sh: #4605: Modify CRL by adding one more cert - PASSED
cert.sh: Modify CRL (ECC) by adding one more cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec
cert.sh: #4606: Modify CRL (ECC) by adding one more cert - PASSED
cert.sh: Modifying CA CRL by removing one cert ===============
cert.sh: Modify CRL by removing one cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #4607: Modify CRL by removing one cert - PASSED
cert.sh: Modify CRL (ECC) by removing one cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec
cert.sh: #4608: Modify CRL (ECC) by removing one cert - PASSED
cert.sh: Creating CA CRL for groups 1 and 2 ===============
cert.sh: Creating CRL for groups 1 and 2 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42
cert.sh: #4609: Creating CRL for groups 1 and 2 - PASSED
cert.sh: Creating CRL (ECC) for groups 1 and 2 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec
cert.sh: #4610: Creating CRL (ECC) for groups 1 and 2 - PASSED
cert.sh: Creating CA CRL for groups 1, 2 and 3 ===============
cert.sh: Creating CRL for groups 1, 2 and 3 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48
cert.sh: #4611: Creating CRL for groups 1, 2 and 3 - PASSED
cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec
cert.sh: #4612: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED
cert.sh: Importing Server CA Issued CRL for certs trough 52
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -D -n TestCA -f ../tests.pw -d ../server
crlutil: could not find TestCA's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA's CRL: No matching CRL was found.
cert.sh: #4613: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server
cert.sh: #4614: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server
crlutil: could not find TestCA-ec's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA-ec's CRL: No matching CRL was found.
cert.sh: #4615: Importing CRL (ECC) for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server
cert.sh: #4616: Importing CRL (ECC) for groups 1 - PASSED
cert.sh SUCCESS: SSL CRL prep passed
cert.sh cert.sh: finished cert.sh
TIMESTAMP cert END: Tue Nov 27 19:09:26 EST 2012
Running tests for tools
TIMESTAMP tools BEGIN: Tue Nov 27 19:09:26 EST 2012
tools.sh: Tools Tests with ECC ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4617: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
6c:9a:d3:db:e3:6e:3b:0b:05:b1:78:44:69:5e:52:34
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4618: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4619: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's email EC cert & key---------------
pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \
-w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4620: Exporting Alice's email EC cert & key (pk12util -o) - PASSED
tools.sh: Importing Alice's email EC cert & key --------------
pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4621: Importing Alice's email EC cert & key (pk12util -i) - PASSED
tools.sh: Listing Alice's pk12 EC file -----------------
pk12util -l Alice-ec.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice-ec
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
28:ef:cb:b8:94:6b:a3:d6:37:9a:1c:a4:cd:37:b5:c6
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: X9.62 ECDSA signature with SHA-1
Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
ia,C=US"
Validity:
Not Before: Wed Nov 28 00:08:44 2012
Not After : Tue Nov 28 00:08:44 2062
Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor
nia,C=US"
Subject Public Key Info:
Public Key Algorithm: X9.62 elliptic curve public key
Args:
06:05:2b:81:04:00:23
EC Public Key:
PublicValue:
04:01:15:92:80:e9:db:d3:38:bd:c8:bf:99:c3:80:bc:
ff:f3:6c:74:f2:3b:74:6f:cb:5b:01:75:04:b5:d6:97:
3c:a2:56:2c:b9:c1:70:a7:27:26:71:31:16:13:ba:c8:
c3:e7:23:a6:7a:6d:a1:a5:6b:b7:72:b8:66:0b:f3:5e:
b2:30:00:01:95:dd:bd:58:28:2c:b8:2f:73:f7:12:12:
26:54:a9:88:fd:af:53:d7:0b:26:b7:47:eb:cd:11:e5:
a1:63:f1:82:15:fe:3a:5d:1f:f0:06:a5:18:b9:b3:e6:
79:a3:a4:1c:80:bc:59:8e:fc:d4:08:b6:9f:12:42:fa:
ae:f9:b6:5b:fd
Curve: SECG elliptic curve secp521r1 (aka NIST P-521)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: X9.62 ECDSA signature with SHA-1
Signature:
30:81:86:02:41:49:d9:f0:bd:6a:35:31:0b:b6:e8:ee:
ab:15:bd:4a:af:00:74:3f:e7:14:16:33:06:cf:11:02:
07:fb:c4:2f:8f:b1:b4:d6:3b:6a:5c:be:98:86:a3:7f:
b6:a4:57:c1:ee:60:75:f5:1e:58:0c:f7:20:ec:02:ba:
2e:b5:50:1e:a9:7e:02:41:03:24:a6:19:a1:25:54:1c:
de:15:5d:fd:57:0e:6c:b5:b8:b9:dc:ad:a8:e9:97:84:
1e:76:c8:5f:b7:91:a6:fe:c2:48:4b:dd:c9:81:8a:ec:
b0:13:d4:72:9d:d6:d0:3b:2b:ac:6c:90:de:e5:0e:8e:
e9:78:3d:e7:0b:15:af:46:18
Fingerprint (MD5):
FC:B5:34:5E:1D:61:55:4B:E1:BF:69:D7:AB:45:56:5D
Fingerprint (SHA1):
FB:85:73:3F:F0:F0:FC:9C:77:45:3C:44:1C:09:EA:6E:CA:7D:B8:AB
Friendly Name: TestCA-ec
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: X9.62 ECDSA signature with SHA-1
Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
ia,C=US"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S
T=California,C=US"
Subject Public Key Info:
Public Key Algorithm: X9.62 elliptic curve public key
Args:
06:05:2b:81:04:00:22
EC Public Key:
PublicValue:
04:e9:2d:81:6c:ab:53:d3:51:f7:da:9e:d8:00:35:06:
80:f9:cf:c8:91:bf:9e:32:cc:40:de:bf:49:82:52:93:
46:01:09:1c:6b:30:82:ba:c5:1f:bb:06:52:df:e0:19:
5f:42:8c:36:3a:27:cc:f8:c0:63:32:fa:cd:ae:2e:a6:
06:d3:73:76:bf:20:6c:67:b9:d8:8c:86:81:b8:d7:44:
bb:64:c3:1b:90:ef:43:6e:cb:b2:ae:fb:d9:e8:56:ce:
ac
Curve: SECG elliptic curve secp384r1 (aka NIST P-384)
Signature Algorithm: X9.62 ECDSA signature with SHA-1
Signature:
30:81:88:02:42:01:16:8d:e0:60:0a:e5:a3:9e:d0:ad:
4d:a5:2d:c3:1f:3c:84:72:f3:bd:e2:93:fe:05:82:99:
16:b4:28:65:88:43:4f:e1:ac:87:84:90:1e:be:fe:83:
fa:50:14:f4:43:51:dd:29:57:41:4e:ec:0a:47:a3:34:
52:bd:0a:24:22:cb:d8:02:42:01:28:a6:f4:09:6f:b3:
85:d8:27:f3:36:60:f6:3a:0b:02:57:82:95:ec:37:98:
57:b0:28:21:c5:e8:d3:3f:84:9b:59:8d:72:cf:06:a5:
6d:26:13:21:29:55:21:a1:27:39:e2:fa:f3:6a:10:24:
69:4e:38:d1:c5:99:4b:8c:a8:92:fd
Fingerprint (MD5):
D3:B7:2E:33:0C:E1:50:28:B1:14:A4:91:E0:04:CA:B6
Fingerprint (SHA1):
39:B3:8E:0E:A8:A3:26:C5:C2:25:60:7B:35:26:A2:6C:CD:AF:09:B6
Friendly Name: Alice-ec
tools.sh: #4622: Listing Alice's pk12 EC file (pk12util -l) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4623: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
Parameters:
Salt:
34:96:32:bd:aa:99:e2:34:ef:6a:2e:c0:f3:71:9f:23
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4624: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4625: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4626: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
Parameters:
Salt:
51:ca:d4:61:cf:0b:5d:79:5c:ce:d5:f5:93:c9:2e:66
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4627: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4628: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4629: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
Parameters:
Salt:
53:a9:42:55:da:27:75:fb:36:14:47:a6:ad:f8:31:2a
Iteration Count: 2000 (0x7d0)
tools.sh: #4630: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4631: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4632: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
dd:29:3f:53:02:07:2e:9d:cf:47:99:e4:42:5f:7d:69
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4633: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4634: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4635: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
f5:19:b5:92:62:d0:79:cb:b6:e4:b1:df:4c:bb:c2:6a
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4636: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4637: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4638: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
cb:6d:b7:3b:6e:4c:38:21:c9:08:40:5c:7d:af:c1:51
Iteration Count: 2000 (0x7d0)
tools.sh: #4639: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4640: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4641: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
08:5c:78:69:0b:6f:b1:3f:66:a3:62:77:27:8d:55:6f
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-128-CBC
Args:
04:10:09:d6:36:d0:01:11:63:aa:3c:43:08:4a:1b:ff:
6d:44
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4642: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4643: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4644: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
93:6f:87:41:a7:f2:3a:c2:02:0e:c6:07:a8:ee:30:42
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-128-CBC
Args:
04:10:8a:50:7c:9f:60:6a:da:73:fc:bc:bc:bb:74:a5:
47:03
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4645: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4646: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4647: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
e5:8e:ec:f3:57:91:23:7f:5c:bf:20:7c:ea:af:62:69
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-128-CBC
Args:
04:10:16:e2:4a:76:87:b3:75:0f:9f:6d:49:99:fc:99:
51:74
tools.sh: #4648: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4649: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4650: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
f5:af:4f:eb:27:45:7f:bb:f1:37:83:43:b2:41:5e:fb
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-192-CBC
Args:
04:10:59:10:58:7d:45:61:e6:92:36:1b:0c:e9:e5:dd:
9c:e4
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4651: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4652: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4653: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
f5:c4:07:12:9f:bb:89:34:36:86:96:bb:12:8a:63:76
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-192-CBC
Args:
04:10:12:ee:4c:df:6d:88:80:d8:b2:f0:05:c0:40:42:
02:d4
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4654: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4655: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4656: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
ba:f6:35:c9:1a:c5:68:d0:36:ff:c9:cd:e8:9e:e7:80
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-192-CBC
Args:
04:10:23:85:ba:40:d2:41:b7:f5:46:9c:3a:3f:8f:f0:
d7:2b
tools.sh: #4657: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4658: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4659: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
ff:76:8e:d9:f1:07:9f:70:83:2f:50:ba:fa:2b:6a:0d
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-256-CBC
Args:
04:10:b8:b7:cc:69:37:d2:1b:b8:13:78:c9:89:a2:2c:
3b:5c
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4660: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4661: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4662: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
41:3c:e7:94:39:60:b0:13:18:58:2e:09:2c:d7:e9:3e
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-256-CBC
Args:
04:10:79:24:49:35:00:37:d5:b3:3f:cf:34:f1:fe:e1:
3f:6d
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4663: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4664: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4665: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
b8:22:32:be:57:21:e9:3b:cd:20:91:70:7a:0d:d4:10
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-256-CBC
Args:
04:10:2e:3d:1c:5d:76:ad:3d:10:32:31:4c:01:eb:24:
b4:4e
tools.sh: #4666: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4667: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4668: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
53:f9:0a:b0:ff:97:3f:3f:f2:5f:75:9f:29:25:d7:f6
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-128-CBC
Args:
04:10:1c:e0:15:11:c2:64:8e:0e:26:f9:87:c4:51:dc:
ac:15
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4669: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4670: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4671: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
e7:48:7b:78:12:09:5f:ee:7c:d9:9a:ed:df:44:66:75
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-128-CBC
Args:
04:10:5b:91:10:c4:90:51:c3:a7:74:65:05:af:a0:26:
41:c3
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4672: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4673: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4674: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
a3:d2:99:fc:8c:5f:94:b0:04:80:d9:93:32:9f:31:bc
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-128-CBC
Args:
04:10:3a:98:df:5d:59:09:dd:63:98:55:00:17:61:ac:
56:7a
tools.sh: #4675: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4676: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4677: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
6a:7b:05:73:55:9f:5c:49:29:8e:d7:66:0b:ee:5d:a4
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-192-CBC
Args:
04:10:00:19:07:12:a3:cf:1f:c5:4a:5f:cb:c4:b3:1e:
e3:70
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4678: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4679: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4680: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
cb:1d:a2:d6:9b:a6:51:de:b5:1c:51:07:97:9e:fe:5c
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-192-CBC
Args:
04:10:cd:e3:0e:4c:70:9a:cb:4a:87:72:92:1d:24:ea:
9b:db
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4681: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4682: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4683: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
de:41:b3:00:fe:84:69:61:e2:c2:37:a8:75:2b:b1:ec
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-192-CBC
Args:
04:10:c1:d7:eb:f4:f2:0b:31:b0:2d:9a:8a:ec:64:43:
9a:f5
tools.sh: #4684: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4685: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4686: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
5d:32:b4:68:8e:06:d2:f0:d6:2a:4d:a5:e6:3c:28:d9
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-256-CBC
Args:
04:10:81:a1:39:13:7b:d0:76:66:dc:e6:ae:9d:24:cd:
02:99
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4687: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4688: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4689: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
1e:b7:3b:75:e5:82:3d:0f:7a:58:89:04:f1:0e:58:46
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-256-CBC
Args:
04:10:6e:e5:73:98:43:7e:b1:ed:4b:52:87:f2:98:13:
c3:72
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4690: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4691: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4692: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
7a:10:30:a9:24:5e:7b:96:d5:cd:bd:fc:e5:ab:6d:6c
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-256-CBC
Args:
04:10:42:64:83:34:3a:73:ce:81:eb:6a:0a:03:30:bb:
32:ae
tools.sh: #4693: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4694: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4695: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
Parameters:
Salt:
ce:97:53:59:32:94:3c:d9:85:a0:a1:3e:53:c3:92:22
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4696: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4697: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4698: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
Parameters:
Salt:
23:79:60:25:d0:2d:a7:e4:f7:04:a9:b6:13:c8:21:7a
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4699: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4700: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4701: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
Parameters:
Salt:
5f:97:ea:11:6a:cc:8c:93:8d:11:e0:32:69:f4:08:e0
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4702: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4703: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4704: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
Parameters:
Salt:
67:cd:c5:c9:83:6b:48:b0:38:1a:ad:b8:81:99:ef:8b
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4705: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4706: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4707: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
Parameters:
Salt:
7c:7d:6d:3f:5e:a3:04:a6:d9:e8:e9:1d:11:e4:e6:3c
Iteration Count: 2000 (0x7d0)
tools.sh: #4708: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4709: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4710: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
Parameters:
Salt:
ab:e7:11:85:a5:2c:fc:f0:e2:a3:55:4a:dd:a8:53:4a
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4711: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4712: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4713: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
Parameters:
Salt:
58:b5:b8:a7:e6:f2:91:7f:29:ea:40:93:76:20:79:60
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4714: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4715: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4716: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
Parameters:
Salt:
28:71:95:bf:da:06:a3:c5:be:63:63:a4:34:a0:8b:a3
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4717: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4718: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4719: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
Parameters:
Salt:
ab:bb:f0:7e:7a:ab:cd:0e:69:5f:55:24:fb:38:a7:b7
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4720: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4721: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4722: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
Parameters:
Salt:
b5:96:c7:8a:82:c5:8c:4b:db:b2:bf:6c:3d:b1:cf:56
Iteration Count: 2000 (0x7d0)
tools.sh: #4723: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4724: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4725: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
Parameters:
Salt:
6e:0f:ca:02:11:82:0b:76:4b:bd:18:8a:c6:6b:99:c5
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4726: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4727: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4728: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
Parameters:
Salt:
0f:4e:98:b4:8a:a0:d8:8c:3b:d6:b2:18:0c:93:ba:47
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4729: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4730: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4731: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
Parameters:
Salt:
e7:08:31:d4:e3:73:39:24:e5:84:1d:3d:42:3f:24:05
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4732: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4733: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4734: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
Parameters:
Salt:
ae:29:58:9d:54:66:c5:16:33:4f:1d:6f:e7:a7:0a:3f
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4735: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4736: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4737: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
Parameters:
Salt:
7a:d4:37:0f:28:a2:7e:5f:ff:2f:66:3a:02:5b:7f:4d
Iteration Count: 2000 (0x7d0)
tools.sh: #4738: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4739: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4740: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
af:09:c3:c3:cd:58:c4:a3:7f:b5:4e:b7:7c:2a:c4:6b
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4741: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4742: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4743: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
bf:97:6f:9c:85:18:d5:e8:6e:01:de:3b:86:99:55:92
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4744: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4745: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4746: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
3e:3b:6c:4a:b9:47:f4:be:3c:6b:f0:67:bd:65:c7:85
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4747: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4748: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4749: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
8c:6d:be:90:7d:22:e6:0c:b4:34:14:91:31:88:d0:12
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4750: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4751: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4752: Exporting with [default:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
13:16:36:d7:c8:5e:43:83:06:0a:35:10:76:21:9d:53
Iteration Count: 2000 (0x7d0)
tools.sh: #4753: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4754: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4755: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
25:08:5c:8d:87:7c:4d:16:8f:cc:6c:6b:9c:b5:18:9a
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4756: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4757: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4758: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
ff:f4:0b:cf:ac:f1:e2:c5:be:4e:de:9c:f8:e6:f6:1b
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4759: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4760: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4761: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
31:4b:96:f1:13:6b:46:ed:4d:68:32:73:10:27:8b:f1
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4762: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4763: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4764: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
9d:c4:2c:c8:2f:00:16:84:5b:4f:d2:78:32:c7:a1:a9
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4765: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4766: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4767: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
d7:eb:2b:b1:f9:ee:32:48:dc:e3:44:8b:99:36:b6:8d
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4768: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4769: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4770: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
12:51:cd:0e:33:17:e8:ac:4d:8e:96:44:e4:86:bd:a4
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4771: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4772: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4773: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
7c:65:9f:1a:0d:d5:14:e0:66:c1:6e:17:6d:9e:ba:af
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4774: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4775: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4776: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
2c:49:12:5f:70:4c:6f:17:41:bf:34:6d:91:33:b9:c2
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4777: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4778: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4779: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
64:6d:9c:2f:02:25:f3:eb:6c:b2:e0:72:56:62:7c:07
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4780: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4781: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4782: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
0f:31:c7:fe:22:52:71:df:ee:ee:56:7c:7e:9c:80:1e
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:43 2012
Not After : Tue Nov 28 00:08:43 2062
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
Fingerprint (MD5):
E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
Fingerprint (SHA1):
C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed Nov 28 00:08:49 2012
Not After : Tue Nov 28 00:08:49 2017
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
Signature:
7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
Fingerprint (MD5):
3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
Fingerprint (SHA1):
5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78
Friendly Name: Alice
tools.sh: #4783: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4784: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": security library: invalid algorithm.
tools.sh: #4785: Exporting with [null:default] (pk12util -o) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4786: Exporting with [default:null] (pk12util -o) - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter
"y" to continue, or anything else to abort:
Enter certificate information. All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #4787: Create objsign cert (signtool -G) - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%)
tree "../tools/html" signed successfully
tools.sh: #4788: Signing a jar of files (signtool -Z) - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
md5 digest on global metainfo: match
sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa
status path
------------ -------------------
verified signjs.html
verified sign.html
tools.sh: #4789: Listing signed files in jar (signtool -v) - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir
Signer information:
nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #4790: Show who signed jar (signtool -w) - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
--> sign.html
Generating zigbert.sf file..
Creating XPI Compatible Archive
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #4791: Signing a xpi of files (signtool -Z -X) - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
md5 digest on global metainfo: match
sha digest on global metainfo: match
status path
------------ -------------------
verified signjs.html
verified sign.html
tools.sh: #4792: Listing signed files in xpi (signtool -v) - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir
Signer information:
nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #4793: Show who signed xpi (signtool -w) - PASSED
TIMESTAMP tools END: Tue Nov 27 19:09:36 EST 2012
Running tests for fips
TIMESTAMP fips BEGIN: Tue Nov 27 19:09:36 EST 2012
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode -----------------
modutil -dbdir ../fips -list
Listing of PKCS #11 Modules
-----------------------------------------------------------
1. NSS Internal FIPS PKCS #11 Module
slots: 1 slot attached
status: loaded
slot: NSS FIPS 140-2 User Private Key Services
token: NSS FIPS 140-2 Certificate DB
2. RootCerts
library name: /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so
slots: 1 slot attached
status: loaded
slot: NSS Builtin Objects
token: Builtin Object Token
-----------------------------------------------------------
FIPS mode enabled.
fips.sh: #4794: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
FIPS_PUB_140_Test_Certificate Cu,Cu,Cu
fips.sh: #4795: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa 0d6c6ddc2699e2ed562790036e8f5a6d8570bfef NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate
fips.sh: #4796: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests.fipsbadpw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect.
fips.sh: #4797: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #4798: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #4799: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #4800: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
FIPS_PUB_140_Test_Certificate Cu,Cu,Cu
fips.sh: #4801: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #4802: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
fips.sh: #4803: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
certutil: no keys found
fips.sh: #4804: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #4805: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
FIPS_PUB_140_Test_Certificate u,u,u
fips.sh: #4806: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa 0d6c6ddc2699e2ed562790036e8f5a6d8570bfef FIPS_PUB_140_Test_Certificate
fips.sh: #4807: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #4808: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
fips.sh: #4809: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #4810: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
FIPS_PUB_140_Test_Certificate u,u,u
fips.sh: #4811: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa 0d6c6ddc2699e2ed562790036e8f5a6d8570bfef FIPS_PUB_140_Test_Certificate
fips.sh: #4812: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
**** Total number of TESTS ran in FIPS MODE is 106. ****
**** ALL TESTS PASSED ****
fips.sh: #4813: Run PK11MODE in FIPS mode (pk11mode) . - PASSED
fips.sh: Run PK11MODE in Non FIPSMODE -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
**** Total number of TESTS ran in NON FIPS MODE is 104. ****
**** ALL TESTS PASSED ****
fips.sh: #4814: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED
mkdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcrmf.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libjar.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnspr4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnspr4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckfw.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsssysinit.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsssysinit.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssutil3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplc4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplc4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplds4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplds4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsqlite3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsqlite.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle/libsoftokn3.so
mangle -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle/libsoftokn3.so -o -8 -b 5
Changing byte 0x000b28a4 (731300): from 5f (95) to 7f (127)
LD_LIBRARY_PATH=/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle dbtest -r -d ../fips
fips.sh: #4815: Init NSS with a corrupted library (dbtest -r) . - PASSED
fips.sh done
TIMESTAMP fips END: Tue Nov 27 19:09:48 EST 2012
Running tests for ssl
TIMESTAMP ssl BEGIN: Tue Nov 27 19:09:48 EST 2012
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:09:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:09:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:09:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4816: Waiting for Server - FAILED
kill -0 20440 >/dev/null 2>/dev/null
selfserv with PID 20440 found at Tue Nov 27 19:09:53 EST 2012
selfserv with PID 20440 started at Tue Nov 27 19:09:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4817: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 20440 at Tue Nov 27 19:09:53 EST 2012
kill -USR1 20440
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20440 killed at Tue Nov 27 19:09:53 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:09:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:09:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:09:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4818: Waiting for Server - FAILED
kill -0 20508 >/dev/null 2>/dev/null
selfserv with PID 20508 found at Tue Nov 27 19:09:58 EST 2012
selfserv with PID 20508 started at Tue Nov 27 19:09:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4819: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 20508 at Tue Nov 27 19:09:58 EST 2012
kill -USR1 20508
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20508 killed at Tue Nov 27 19:09:58 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:09:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:09:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4820: Waiting for Server - FAILED
kill -0 20576 >/dev/null 2>/dev/null
selfserv with PID 20576 found at Tue Nov 27 19:10:04 EST 2012
selfserv with PID 20576 started at Tue Nov 27 19:10:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4821: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 20576 at Tue Nov 27 19:10:04 EST 2012
kill -USR1 20576
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20576 killed at Tue Nov 27 19:10:04 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:10:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:10:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4822: Waiting for Server - FAILED
kill -0 20666 >/dev/null 2>/dev/null
selfserv with PID 20666 found at Tue Nov 27 19:10:09 EST 2012
selfserv with PID 20666 started at Tue Nov 27 19:10:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4823: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 20666 at Tue Nov 27 19:10:09 EST 2012
kill -USR1 20666
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20666 killed at Tue Nov 27 19:10:09 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:10:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:10:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4824: Waiting for Server - FAILED
kill -0 20734 >/dev/null 2>/dev/null
selfserv with PID 20734 found at Tue Nov 27 19:10:14 EST 2012
selfserv with PID 20734 started at Tue Nov 27 19:10:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4825: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 20734 at Tue Nov 27 19:10:14 EST 2012
kill -USR1 20734
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20734 killed at Tue Nov 27 19:10:14 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:10:14 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:10:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4826: Waiting for Server - FAILED
kill -0 20802 >/dev/null 2>/dev/null
selfserv with PID 20802 found at Tue Nov 27 19:10:19 EST 2012
selfserv with PID 20802 started at Tue Nov 27 19:10:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4827: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 20802 at Tue Nov 27 19:10:19 EST 2012
kill -USR1 20802
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20802 killed at Tue Nov 27 19:10:19 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:10:19 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:10:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4828: Waiting for Server - FAILED
kill -0 20882 >/dev/null 2>/dev/null
selfserv with PID 20882 found at Tue Nov 27 19:10:24 EST 2012
selfserv with PID 20882 started at Tue Nov 27 19:10:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4829: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 20882 at Tue Nov 27 19:10:24 EST 2012
kill -USR1 20882
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20882 killed at Tue Nov 27 19:10:24 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:10:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:10:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4830: Waiting for Server - FAILED
kill -0 20950 >/dev/null 2>/dev/null
selfserv with PID 20950 found at Tue Nov 27 19:10:29 EST 2012
selfserv with PID 20950 started at Tue Nov 27 19:10:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4831: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 20950 at Tue Nov 27 19:10:29 EST 2012
kill -USR1 20950
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20950 killed at Tue Nov 27 19:10:30 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:10:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:10:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4832: Waiting for Server - FAILED
kill -0 21018 >/dev/null 2>/dev/null
selfserv with PID 21018 found at Tue Nov 27 19:10:35 EST 2012
selfserv with PID 21018 started at Tue Nov 27 19:10:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4833: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21018 at Tue Nov 27 19:10:35 EST 2012
kill -USR1 21018
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21018 killed at Tue Nov 27 19:10:35 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:10:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:10:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4834: Waiting for Server - FAILED
kill -0 21098 >/dev/null 2>/dev/null
selfserv with PID 21098 found at Tue Nov 27 19:10:40 EST 2012
selfserv with PID 21098 started at Tue Nov 27 19:10:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4835: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21098 at Tue Nov 27 19:10:40 EST 2012
kill -USR1 21098
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21098 killed at Tue Nov 27 19:10:40 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:10:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:10:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4836: Waiting for Server - FAILED
kill -0 21166 >/dev/null 2>/dev/null
selfserv with PID 21166 found at Tue Nov 27 19:10:45 EST 2012
selfserv with PID 21166 started at Tue Nov 27 19:10:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4837: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21166 at Tue Nov 27 19:10:45 EST 2012
kill -USR1 21166
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21166 killed at Tue Nov 27 19:10:45 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:10:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:10:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4838: Waiting for Server - FAILED
kill -0 21234 >/dev/null 2>/dev/null
selfserv with PID 21234 found at Tue Nov 27 19:10:50 EST 2012
selfserv with PID 21234 started at Tue Nov 27 19:10:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4839: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21234 at Tue Nov 27 19:10:50 EST 2012
kill -USR1 21234
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21234 killed at Tue Nov 27 19:10:50 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:10:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:10:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4840: Waiting for Server - FAILED
kill -0 21314 >/dev/null 2>/dev/null
selfserv with PID 21314 found at Tue Nov 27 19:10:55 EST 2012
selfserv with PID 21314 started at Tue Nov 27 19:10:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4841: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21314 at Tue Nov 27 19:10:55 EST 2012
kill -USR1 21314
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21314 killed at Tue Nov 27 19:10:55 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:10:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:10:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4842: Waiting for Server - FAILED
kill -0 21382 >/dev/null 2>/dev/null
selfserv with PID 21382 found at Tue Nov 27 19:11:00 EST 2012
selfserv with PID 21382 started at Tue Nov 27 19:11:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4843: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21382 at Tue Nov 27 19:11:00 EST 2012
kill -USR1 21382
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21382 killed at Tue Nov 27 19:11:01 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:11:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:11:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4844: Waiting for Server - FAILED
kill -0 21450 >/dev/null 2>/dev/null
selfserv with PID 21450 found at Tue Nov 27 19:11:06 EST 2012
selfserv with PID 21450 started at Tue Nov 27 19:11:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4845: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21450 at Tue Nov 27 19:11:06 EST 2012
kill -USR1 21450
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21450 killed at Tue Nov 27 19:11:06 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:11:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:11:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4846: Waiting for Server - FAILED
kill -0 21530 >/dev/null 2>/dev/null
selfserv with PID 21530 found at Tue Nov 27 19:11:11 EST 2012
selfserv with PID 21530 started at Tue Nov 27 19:11:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4847: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21530 at Tue Nov 27 19:11:11 EST 2012
kill -USR1 21530
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21530 killed at Tue Nov 27 19:11:11 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:11:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:11:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4848: Waiting for Server - FAILED
kill -0 21598 >/dev/null 2>/dev/null
selfserv with PID 21598 found at Tue Nov 27 19:11:16 EST 2012
selfserv with PID 21598 started at Tue Nov 27 19:11:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4849: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 21598 at Tue Nov 27 19:11:16 EST 2012
kill -USR1 21598
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21598 killed at Tue Nov 27 19:11:16 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:11:16 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:11:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4850: Waiting for Server - FAILED
kill -0 21666 >/dev/null 2>/dev/null
selfserv with PID 21666 found at Tue Nov 27 19:11:21 EST 2012
selfserv with PID 21666 started at Tue Nov 27 19:11:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4851: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21666 at Tue Nov 27 19:11:21 EST 2012
kill -USR1 21666
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21666 killed at Tue Nov 27 19:11:21 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:11:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:11:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4852: Waiting for Server - FAILED
kill -0 21746 >/dev/null 2>/dev/null
selfserv with PID 21746 found at Tue Nov 27 19:11:26 EST 2012
selfserv with PID 21746 started at Tue Nov 27 19:11:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4853: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 21746 at Tue Nov 27 19:11:26 EST 2012
kill -USR1 21746
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21746 killed at Tue Nov 27 19:11:26 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:11:26 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:11:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4854: Waiting for Server - FAILED
kill -0 21814 >/dev/null 2>/dev/null
selfserv with PID 21814 found at Tue Nov 27 19:11:32 EST 2012
selfserv with PID 21814 started at Tue Nov 27 19:11:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4855: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 21814 at Tue Nov 27 19:11:32 EST 2012
kill -USR1 21814
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21814 killed at Tue Nov 27 19:11:32 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:11:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:11:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4856: Waiting for Server - FAILED
kill -0 21882 >/dev/null 2>/dev/null
selfserv with PID 21882 found at Tue Nov 27 19:11:37 EST 2012
selfserv with PID 21882 started at Tue Nov 27 19:11:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4857: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 21882 at Tue Nov 27 19:11:37 EST 2012
kill -USR1 21882
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21882 killed at Tue Nov 27 19:11:37 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:11:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:11:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4858: Waiting for Server - FAILED
kill -0 21962 >/dev/null 2>/dev/null
selfserv with PID 21962 found at Tue Nov 27 19:11:42 EST 2012
selfserv with PID 21962 started at Tue Nov 27 19:11:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4859: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 21962 at Tue Nov 27 19:11:42 EST 2012
kill -USR1 21962
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21962 killed at Tue Nov 27 19:11:42 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:11:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:11:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4860: Waiting for Server - FAILED
kill -0 22030 >/dev/null 2>/dev/null
selfserv with PID 22030 found at Tue Nov 27 19:11:47 EST 2012
selfserv with PID 22030 started at Tue Nov 27 19:11:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4861: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 22030 at Tue Nov 27 19:11:47 EST 2012
kill -USR1 22030
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22030 killed at Tue Nov 27 19:11:47 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:11:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:11:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4862: Waiting for Server - FAILED
kill -0 22098 >/dev/null 2>/dev/null
selfserv with PID 22098 found at Tue Nov 27 19:11:52 EST 2012
selfserv with PID 22098 started at Tue Nov 27 19:11:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4863: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 22098 at Tue Nov 27 19:11:52 EST 2012
kill -USR1 22098
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22098 killed at Tue Nov 27 19:11:52 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:11:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:11:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4864: Waiting for Server - FAILED
kill -0 22178 >/dev/null 2>/dev/null
selfserv with PID 22178 found at Tue Nov 27 19:11:57 EST 2012
selfserv with PID 22178 started at Tue Nov 27 19:11:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4865: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22178 at Tue Nov 27 19:11:57 EST 2012
kill -USR1 22178
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22178 killed at Tue Nov 27 19:11:57 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:11:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:11:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4866: Waiting for Server - FAILED
kill -0 22246 >/dev/null 2>/dev/null
selfserv with PID 22246 found at Tue Nov 27 19:12:03 EST 2012
selfserv with PID 22246 started at Tue Nov 27 19:12:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4867: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 22246 at Tue Nov 27 19:12:03 EST 2012
kill -USR1 22246
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22246 killed at Tue Nov 27 19:12:03 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:12:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:12:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4868: Waiting for Server - FAILED
kill -0 22325 >/dev/null 2>/dev/null
selfserv with PID 22325 found at Tue Nov 27 19:12:08 EST 2012
selfserv with PID 22325 started at Tue Nov 27 19:12:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4869: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22325 at Tue Nov 27 19:12:08 EST 2012
kill -USR1 22325
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22325 killed at Tue Nov 27 19:12:08 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:12:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:12:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4870: Waiting for Server - FAILED
kill -0 22405 >/dev/null 2>/dev/null
selfserv with PID 22405 found at Tue Nov 27 19:12:13 EST 2012
selfserv with PID 22405 started at Tue Nov 27 19:12:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4871: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22405 at Tue Nov 27 19:12:13 EST 2012
kill -USR1 22405
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22405 killed at Tue Nov 27 19:12:13 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:12:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:12:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4872: Waiting for Server - FAILED
kill -0 22473 >/dev/null 2>/dev/null
selfserv with PID 22473 found at Tue Nov 27 19:12:18 EST 2012
selfserv with PID 22473 started at Tue Nov 27 19:12:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4873: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22473 at Tue Nov 27 19:12:18 EST 2012
kill -USR1 22473
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22473 killed at Tue Nov 27 19:12:18 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:12:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:12:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4874: Waiting for Server - FAILED
kill -0 22541 >/dev/null 2>/dev/null
selfserv with PID 22541 found at Tue Nov 27 19:12:23 EST 2012
selfserv with PID 22541 started at Tue Nov 27 19:12:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4875: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22541 at Tue Nov 27 19:12:23 EST 2012
kill -USR1 22541
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22541 killed at Tue Nov 27 19:12:23 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:12:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:12:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4876: Waiting for Server - FAILED
kill -0 22621 >/dev/null 2>/dev/null
selfserv with PID 22621 found at Tue Nov 27 19:12:28 EST 2012
selfserv with PID 22621 started at Tue Nov 27 19:12:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4877: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22621 at Tue Nov 27 19:12:28 EST 2012
kill -USR1 22621
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22621 killed at Tue Nov 27 19:12:28 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:12:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:12:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4878: Waiting for Server - FAILED
kill -0 22689 >/dev/null 2>/dev/null
selfserv with PID 22689 found at Tue Nov 27 19:12:33 EST 2012
selfserv with PID 22689 started at Tue Nov 27 19:12:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4879: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22689 at Tue Nov 27 19:12:34 EST 2012
kill -USR1 22689
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22689 killed at Tue Nov 27 19:12:34 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:12:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:12:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4880: Waiting for Server - FAILED
kill -0 22757 >/dev/null 2>/dev/null
selfserv with PID 22757 found at Tue Nov 27 19:12:39 EST 2012
selfserv with PID 22757 started at Tue Nov 27 19:12:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4881: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22757 at Tue Nov 27 19:12:39 EST 2012
kill -USR1 22757
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22757 killed at Tue Nov 27 19:12:39 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:12:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:12:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4882: Waiting for Server - FAILED
kill -0 22837 >/dev/null 2>/dev/null
selfserv with PID 22837 found at Tue Nov 27 19:12:44 EST 2012
selfserv with PID 22837 started at Tue Nov 27 19:12:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4883: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22837 at Tue Nov 27 19:12:44 EST 2012
kill -USR1 22837
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22837 killed at Tue Nov 27 19:12:44 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:12:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:12:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4884: Waiting for Server - FAILED
kill -0 22905 >/dev/null 2>/dev/null
selfserv with PID 22905 found at Tue Nov 27 19:12:49 EST 2012
selfserv with PID 22905 started at Tue Nov 27 19:12:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4885: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 22905 at Tue Nov 27 19:12:49 EST 2012
kill -USR1 22905
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22905 killed at Tue Nov 27 19:12:49 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:12:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:12:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4886: Waiting for Server - FAILED
kill -0 22973 >/dev/null 2>/dev/null
selfserv with PID 22973 found at Tue Nov 27 19:12:54 EST 2012
selfserv with PID 22973 started at Tue Nov 27 19:12:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4887: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22973 at Tue Nov 27 19:12:54 EST 2012
kill -USR1 22973
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22973 killed at Tue Nov 27 19:12:54 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:12:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:12:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4888: Waiting for Server - FAILED
kill -0 23053 >/dev/null 2>/dev/null
selfserv with PID 23053 found at Tue Nov 27 19:12:59 EST 2012
selfserv with PID 23053 started at Tue Nov 27 19:12:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4889: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 23053 at Tue Nov 27 19:12:59 EST 2012
kill -USR1 23053
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23053 killed at Tue Nov 27 19:12:59 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:12:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:12:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:13:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4890: Waiting for Server - FAILED
kill -0 23121 >/dev/null 2>/dev/null
selfserv with PID 23121 found at Tue Nov 27 19:13:04 EST 2012
selfserv with PID 23121 started at Tue Nov 27 19:13:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4891: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 23121 at Tue Nov 27 19:13:05 EST 2012
kill -USR1 23121
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23121 killed at Tue Nov 27 19:13:05 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:13:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4892: Waiting for Server - FAILED
kill -0 23189 >/dev/null 2>/dev/null
selfserv with PID 23189 found at Tue Nov 27 19:13:10 EST 2012
selfserv with PID 23189 started at Tue Nov 27 19:13:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4893: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 23189 at Tue Nov 27 19:13:10 EST 2012
kill -USR1 23189
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23189 killed at Tue Nov 27 19:13:10 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:13:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4894: Waiting for Server - FAILED
kill -0 23269 >/dev/null 2>/dev/null
selfserv with PID 23269 found at Tue Nov 27 19:13:15 EST 2012
selfserv with PID 23269 started at Tue Nov 27 19:13:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4895: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 23269 at Tue Nov 27 19:13:15 EST 2012
kill -USR1 23269
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23269 killed at Tue Nov 27 19:13:15 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:15 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:13:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4896: Waiting for Server - FAILED
kill -0 23337 >/dev/null 2>/dev/null
selfserv with PID 23337 found at Tue Nov 27 19:13:20 EST 2012
selfserv with PID 23337 started at Tue Nov 27 19:13:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4897: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 23337 at Tue Nov 27 19:13:20 EST 2012
kill -USR1 23337
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23337 killed at Tue Nov 27 19:13:20 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:13:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4898: Waiting for Server - FAILED
kill -0 23405 >/dev/null 2>/dev/null
selfserv with PID 23405 found at Tue Nov 27 19:13:25 EST 2012
selfserv with PID 23405 started at Tue Nov 27 19:13:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4899: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 23405 at Tue Nov 27 19:13:25 EST 2012
kill -USR1 23405
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23405 killed at Tue Nov 27 19:13:25 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:13:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4900: Waiting for Server - FAILED
kill -0 23485 >/dev/null 2>/dev/null
selfserv with PID 23485 found at Tue Nov 27 19:13:30 EST 2012
selfserv with PID 23485 started at Tue Nov 27 19:13:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4901: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23485 at Tue Nov 27 19:13:30 EST 2012
kill -USR1 23485
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23485 killed at Tue Nov 27 19:13:30 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:13:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4902: Waiting for Server - FAILED
kill -0 23553 >/dev/null 2>/dev/null
selfserv with PID 23553 found at Tue Nov 27 19:13:35 EST 2012
selfserv with PID 23553 started at Tue Nov 27 19:13:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4903: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 23553 at Tue Nov 27 19:13:35 EST 2012
kill -USR1 23553
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23553 killed at Tue Nov 27 19:13:35 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:13:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23621 >/dev/null 2>/dev/null
selfserv with PID 23621 found at Tue Nov 27 19:13:41 EST 2012
selfserv with PID 23621 started at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4904: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23621 at Tue Nov 27 19:13:41 EST 2012
kill -USR1 23621
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23621 killed at Tue Nov 27 19:13:41 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23693 >/dev/null 2>/dev/null
selfserv with PID 23693 found at Tue Nov 27 19:13:41 EST 2012
selfserv with PID 23693 started at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4905: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23693 at Tue Nov 27 19:13:41 EST 2012
kill -USR1 23693
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23693 killed at Tue Nov 27 19:13:41 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23749 >/dev/null 2>/dev/null
selfserv with PID 23749 found at Tue Nov 27 19:13:41 EST 2012
selfserv with PID 23749 started at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4906: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23749 at Tue Nov 27 19:13:41 EST 2012
kill -USR1 23749
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23749 killed at Tue Nov 27 19:13:41 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23805 >/dev/null 2>/dev/null
selfserv with PID 23805 found at Tue Nov 27 19:13:41 EST 2012
selfserv with PID 23805 started at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4907: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23805 at Tue Nov 27 19:13:41 EST 2012
kill -USR1 23805
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23805 killed at Tue Nov 27 19:13:41 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23873 >/dev/null 2>/dev/null
selfserv with PID 23873 found at Tue Nov 27 19:13:41 EST 2012
selfserv with PID 23873 started at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4908: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23873 at Tue Nov 27 19:13:41 EST 2012
kill -USR1 23873
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23873 killed at Tue Nov 27 19:13:41 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23929 >/dev/null 2>/dev/null
selfserv with PID 23929 found at Tue Nov 27 19:13:41 EST 2012
selfserv with PID 23929 started at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4909: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23929 at Tue Nov 27 19:13:42 EST 2012
kill -USR1 23929
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23929 killed at Tue Nov 27 19:13:42 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23985 >/dev/null 2>/dev/null
selfserv with PID 23985 found at Tue Nov 27 19:13:42 EST 2012
selfserv with PID 23985 started at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4910: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23985 at Tue Nov 27 19:13:42 EST 2012
kill -USR1 23985
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23985 killed at Tue Nov 27 19:13:42 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24053 >/dev/null 2>/dev/null
selfserv with PID 24053 found at Tue Nov 27 19:13:42 EST 2012
selfserv with PID 24053 started at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4911: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24053 at Tue Nov 27 19:13:42 EST 2012
kill -USR1 24053
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24053 killed at Tue Nov 27 19:13:42 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24109 >/dev/null 2>/dev/null
selfserv with PID 24109 found at Tue Nov 27 19:13:42 EST 2012
selfserv with PID 24109 started at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4912: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24109 at Tue Nov 27 19:13:42 EST 2012
kill -USR1 24109
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24109 killed at Tue Nov 27 19:13:42 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24165 >/dev/null 2>/dev/null
selfserv with PID 24165 found at Tue Nov 27 19:13:42 EST 2012
selfserv with PID 24165 started at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4913: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24165 at Tue Nov 27 19:13:42 EST 2012
kill -USR1 24165
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24165 killed at Tue Nov 27 19:13:42 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24233 >/dev/null 2>/dev/null
selfserv with PID 24233 found at Tue Nov 27 19:13:42 EST 2012
selfserv with PID 24233 started at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4914: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24233 at Tue Nov 27 19:13:43 EST 2012
kill -USR1 24233
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24233 killed at Tue Nov 27 19:13:43 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24289 >/dev/null 2>/dev/null
selfserv with PID 24289 found at Tue Nov 27 19:13:43 EST 2012
selfserv with PID 24289 started at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4915: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24289 at Tue Nov 27 19:13:43 EST 2012
kill -USR1 24289
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24289 killed at Tue Nov 27 19:13:43 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24345 >/dev/null 2>/dev/null
selfserv with PID 24345 found at Tue Nov 27 19:13:43 EST 2012
selfserv with PID 24345 started at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4916: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24345 at Tue Nov 27 19:13:43 EST 2012
kill -USR1 24345
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24345 killed at Tue Nov 27 19:13:43 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24413 >/dev/null 2>/dev/null
selfserv with PID 24413 found at Tue Nov 27 19:13:43 EST 2012
selfserv with PID 24413 started at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4917: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24413 at Tue Nov 27 19:13:43 EST 2012
kill -USR1 24413
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24413 killed at Tue Nov 27 19:13:43 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24469 >/dev/null 2>/dev/null
selfserv with PID 24469 found at Tue Nov 27 19:13:43 EST 2012
selfserv with PID 24469 started at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4918: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24469 at Tue Nov 27 19:13:43 EST 2012
kill -USR1 24469
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24469 killed at Tue Nov 27 19:13:43 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24525 >/dev/null 2>/dev/null
selfserv with PID 24525 found at Tue Nov 27 19:13:43 EST 2012
selfserv with PID 24525 started at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4919: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24525 at Tue Nov 27 19:13:44 EST 2012
kill -USR1 24525
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24525 killed at Tue Nov 27 19:13:44 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24593 >/dev/null 2>/dev/null
selfserv with PID 24593 found at Tue Nov 27 19:13:44 EST 2012
selfserv with PID 24593 started at Tue Nov 27 19:13:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4920: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24593 at Tue Nov 27 19:13:44 EST 2012
kill -USR1 24593
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24593 killed at Tue Nov 27 19:13:44 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24649 >/dev/null 2>/dev/null
selfserv with PID 24649 found at Tue Nov 27 19:13:44 EST 2012
selfserv with PID 24649 started at Tue Nov 27 19:13:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4921: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24649 at Tue Nov 27 19:13:44 EST 2012
kill -USR1 24649
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24649 killed at Tue Nov 27 19:13:44 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24705 >/dev/null 2>/dev/null
selfserv with PID 24705 found at Tue Nov 27 19:13:44 EST 2012
selfserv with PID 24705 started at Tue Nov 27 19:13:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4922: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24705 at Tue Nov 27 19:13:44 EST 2012
kill -USR1 24705
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24705 killed at Tue Nov 27 19:13:44 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24773 >/dev/null 2>/dev/null
selfserv with PID 24773 found at Tue Nov 27 19:13:44 EST 2012
selfserv with PID 24773 started at Tue Nov 27 19:13:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4923: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24773 at Tue Nov 27 19:13:45 EST 2012
kill -USR1 24773
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24773 killed at Tue Nov 27 19:13:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24829 >/dev/null 2>/dev/null
selfserv with PID 24829 found at Tue Nov 27 19:13:45 EST 2012
selfserv with PID 24829 started at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4924: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24829 at Tue Nov 27 19:13:45 EST 2012
kill -USR1 24829
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24829 killed at Tue Nov 27 19:13:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24885 >/dev/null 2>/dev/null
selfserv with PID 24885 found at Tue Nov 27 19:13:45 EST 2012
selfserv with PID 24885 started at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4925: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24885 at Tue Nov 27 19:13:45 EST 2012
kill -USR1 24885
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24885 killed at Tue Nov 27 19:13:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24953 >/dev/null 2>/dev/null
selfserv with PID 24953 found at Tue Nov 27 19:13:45 EST 2012
selfserv with PID 24953 started at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4926: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24953 at Tue Nov 27 19:13:45 EST 2012
kill -USR1 24953
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24953 killed at Tue Nov 27 19:13:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25009 >/dev/null 2>/dev/null
selfserv with PID 25009 found at Tue Nov 27 19:13:45 EST 2012
selfserv with PID 25009 started at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4927: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25009 at Tue Nov 27 19:13:45 EST 2012
kill -USR1 25009
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25009 killed at Tue Nov 27 19:13:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25065 >/dev/null 2>/dev/null
selfserv with PID 25065 found at Tue Nov 27 19:13:45 EST 2012
selfserv with PID 25065 started at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4928: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25065 at Tue Nov 27 19:13:46 EST 2012
kill -USR1 25065
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25065 killed at Tue Nov 27 19:13:46 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25133 >/dev/null 2>/dev/null
selfserv with PID 25133 found at Tue Nov 27 19:13:46 EST 2012
selfserv with PID 25133 started at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4929: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25133 at Tue Nov 27 19:13:46 EST 2012
kill -USR1 25133
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25133 killed at Tue Nov 27 19:13:46 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25189 >/dev/null 2>/dev/null
selfserv with PID 25189 found at Tue Nov 27 19:13:46 EST 2012
selfserv with PID 25189 started at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4930: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25189 at Tue Nov 27 19:13:46 EST 2012
kill -USR1 25189
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25189 killed at Tue Nov 27 19:13:46 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25245 >/dev/null 2>/dev/null
selfserv with PID 25245 found at Tue Nov 27 19:13:46 EST 2012
selfserv with PID 25245 started at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4931: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25245 at Tue Nov 27 19:13:46 EST 2012
kill -USR1 25245
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25245 killed at Tue Nov 27 19:13:46 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25313 >/dev/null 2>/dev/null
selfserv with PID 25313 found at Tue Nov 27 19:13:46 EST 2012
selfserv with PID 25313 started at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4932: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25313 at Tue Nov 27 19:13:46 EST 2012
kill -USR1 25313
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25313 killed at Tue Nov 27 19:13:46 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25369 >/dev/null 2>/dev/null
selfserv with PID 25369 found at Tue Nov 27 19:13:46 EST 2012
selfserv with PID 25369 started at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4933: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25369 at Tue Nov 27 19:13:47 EST 2012
kill -USR1 25369
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25369 killed at Tue Nov 27 19:13:47 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25425 >/dev/null 2>/dev/null
selfserv with PID 25425 found at Tue Nov 27 19:13:47 EST 2012
selfserv with PID 25425 started at Tue Nov 27 19:13:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4934: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25425 at Tue Nov 27 19:13:47 EST 2012
kill -USR1 25425
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25425 killed at Tue Nov 27 19:13:47 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25493 >/dev/null 2>/dev/null
selfserv with PID 25493 found at Tue Nov 27 19:13:47 EST 2012
selfserv with PID 25493 started at Tue Nov 27 19:13:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4935: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25493 at Tue Nov 27 19:13:47 EST 2012
kill -USR1 25493
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25493 killed at Tue Nov 27 19:13:47 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25549 >/dev/null 2>/dev/null
selfserv with PID 25549 found at Tue Nov 27 19:13:47 EST 2012
selfserv with PID 25549 started at Tue Nov 27 19:13:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4936: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25549 at Tue Nov 27 19:13:47 EST 2012
kill -USR1 25549
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25549 killed at Tue Nov 27 19:13:47 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25605 >/dev/null 2>/dev/null
selfserv with PID 25605 found at Tue Nov 27 19:13:47 EST 2012
selfserv with PID 25605 started at Tue Nov 27 19:13:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4937: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25605 at Tue Nov 27 19:13:47 EST 2012
kill -USR1 25605
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25605 killed at Tue Nov 27 19:13:47 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25673 >/dev/null 2>/dev/null
selfserv with PID 25673 found at Tue Nov 27 19:13:48 EST 2012
selfserv with PID 25673 started at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4938: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25673 at Tue Nov 27 19:13:48 EST 2012
kill -USR1 25673
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25673 killed at Tue Nov 27 19:13:48 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25729 >/dev/null 2>/dev/null
selfserv with PID 25729 found at Tue Nov 27 19:13:48 EST 2012
selfserv with PID 25729 started at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4939: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25729 at Tue Nov 27 19:13:48 EST 2012
kill -USR1 25729
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25729 killed at Tue Nov 27 19:13:48 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25785 >/dev/null 2>/dev/null
selfserv with PID 25785 found at Tue Nov 27 19:13:48 EST 2012
selfserv with PID 25785 started at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4940: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25785 at Tue Nov 27 19:13:48 EST 2012
kill -USR1 25785
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25785 killed at Tue Nov 27 19:13:48 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25853 >/dev/null 2>/dev/null
selfserv with PID 25853 found at Tue Nov 27 19:13:48 EST 2012
selfserv with PID 25853 started at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4941: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25853 at Tue Nov 27 19:13:48 EST 2012
kill -USR1 25853
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25853 killed at Tue Nov 27 19:13:48 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25909 >/dev/null 2>/dev/null
selfserv with PID 25909 found at Tue Nov 27 19:13:48 EST 2012
selfserv with PID 25909 started at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4942: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25909 at Tue Nov 27 19:13:49 EST 2012
kill -USR1 25909
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25909 killed at Tue Nov 27 19:13:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25965 >/dev/null 2>/dev/null
selfserv with PID 25965 found at Tue Nov 27 19:13:49 EST 2012
selfserv with PID 25965 started at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4943: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25965 at Tue Nov 27 19:13:49 EST 2012
kill -USR1 25965
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25965 killed at Tue Nov 27 19:13:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26033 >/dev/null 2>/dev/null
selfserv with PID 26033 found at Tue Nov 27 19:13:49 EST 2012
selfserv with PID 26033 started at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4944: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26033 at Tue Nov 27 19:13:49 EST 2012
kill -USR1 26033
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26033 killed at Tue Nov 27 19:13:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26089 >/dev/null 2>/dev/null
selfserv with PID 26089 found at Tue Nov 27 19:13:49 EST 2012
selfserv with PID 26089 started at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4945: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26089 at Tue Nov 27 19:13:49 EST 2012
kill -USR1 26089
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26089 killed at Tue Nov 27 19:13:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26145 >/dev/null 2>/dev/null
selfserv with PID 26145 found at Tue Nov 27 19:13:49 EST 2012
selfserv with PID 26145 started at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4946: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26145 at Tue Nov 27 19:13:49 EST 2012
kill -USR1 26145
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26145 killed at Tue Nov 27 19:13:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26213 >/dev/null 2>/dev/null
selfserv with PID 26213 found at Tue Nov 27 19:13:49 EST 2012
selfserv with PID 26213 started at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4947: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26213 at Tue Nov 27 19:13:50 EST 2012
kill -USR1 26213
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26213 killed at Tue Nov 27 19:13:50 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26269 >/dev/null 2>/dev/null
selfserv with PID 26269 found at Tue Nov 27 19:13:50 EST 2012
selfserv with PID 26269 started at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4948: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26269 at Tue Nov 27 19:13:50 EST 2012
kill -USR1 26269
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26269 killed at Tue Nov 27 19:13:50 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:13:50 EST 2012
selfserv with PID 26325 started at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4949: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26325 at Tue Nov 27 19:13:50 EST 2012
kill -USR1 26325
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26325 killed at Tue Nov 27 19:13:50 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26402 >/dev/null 2>/dev/null
selfserv with PID 26402 found at Tue Nov 27 19:13:50 EST 2012
selfserv with PID 26402 started at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4950: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26402 at Tue Nov 27 19:13:50 EST 2012
kill -USR1 26402
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26402 killed at Tue Nov 27 19:13:50 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26458 >/dev/null 2>/dev/null
selfserv with PID 26458 found at Tue Nov 27 19:13:50 EST 2012
selfserv with PID 26458 started at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4951: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26458 at Tue Nov 27 19:13:50 EST 2012
kill -USR1 26458
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26458 killed at Tue Nov 27 19:13:50 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26514 >/dev/null 2>/dev/null
selfserv with PID 26514 found at Tue Nov 27 19:13:50 EST 2012
selfserv with PID 26514 started at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4952: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26514 at Tue Nov 27 19:13:51 EST 2012
kill -USR1 26514
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26514 killed at Tue Nov 27 19:13:51 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26582 >/dev/null 2>/dev/null
selfserv with PID 26582 found at Tue Nov 27 19:13:51 EST 2012
selfserv with PID 26582 started at Tue Nov 27 19:13:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4953: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26582 at Tue Nov 27 19:13:51 EST 2012
kill -USR1 26582
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26582 killed at Tue Nov 27 19:13:51 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26638 >/dev/null 2>/dev/null
selfserv with PID 26638 found at Tue Nov 27 19:13:51 EST 2012
selfserv with PID 26638 started at Tue Nov 27 19:13:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4954: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26638 at Tue Nov 27 19:13:51 EST 2012
kill -USR1 26638
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26638 killed at Tue Nov 27 19:13:51 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26694 >/dev/null 2>/dev/null
selfserv with PID 26694 found at Tue Nov 27 19:13:51 EST 2012
selfserv with PID 26694 started at Tue Nov 27 19:13:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4955: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26694 at Tue Nov 27 19:13:51 EST 2012
kill -USR1 26694
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26694 killed at Tue Nov 27 19:13:51 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26762 >/dev/null 2>/dev/null
selfserv with PID 26762 found at Tue Nov 27 19:13:51 EST 2012
selfserv with PID 26762 started at Tue Nov 27 19:13:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4956: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26762 at Tue Nov 27 19:13:52 EST 2012
kill -USR1 26762
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26762 killed at Tue Nov 27 19:13:52 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26818 >/dev/null 2>/dev/null
selfserv with PID 26818 found at Tue Nov 27 19:13:52 EST 2012
selfserv with PID 26818 started at Tue Nov 27 19:13:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4957: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26818 at Tue Nov 27 19:13:52 EST 2012
kill -USR1 26818
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26818 killed at Tue Nov 27 19:13:52 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26874 >/dev/null 2>/dev/null
selfserv with PID 26874 found at Tue Nov 27 19:13:52 EST 2012
selfserv with PID 26874 started at Tue Nov 27 19:13:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w bogus -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4958: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26874 at Tue Nov 27 19:13:52 EST 2012
kill -USR1 26874
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26874 killed at Tue Nov 27 19:13:52 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26942 >/dev/null 2>/dev/null
selfserv with PID 26942 found at Tue Nov 27 19:13:52 EST 2012
selfserv with PID 26942 started at Tue Nov 27 19:13:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4959: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26942 at Tue Nov 27 19:13:52 EST 2012
kill -USR1 26942
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26942 killed at Tue Nov 27 19:13:52 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26998 >/dev/null 2>/dev/null
selfserv with PID 26998 found at Tue Nov 27 19:13:52 EST 2012
selfserv with PID 26998 started at Tue Nov 27 19:13:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4960: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26998 at Tue Nov 27 19:13:53 EST 2012
kill -USR1 26998
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26998 killed at Tue Nov 27 19:13:53 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27054 >/dev/null 2>/dev/null
selfserv with PID 27054 found at Tue Nov 27 19:13:53 EST 2012
selfserv with PID 27054 started at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4961: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27054 at Tue Nov 27 19:13:53 EST 2012
kill -USR1 27054
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27054 killed at Tue Nov 27 19:13:53 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27122 >/dev/null 2>/dev/null
selfserv with PID 27122 found at Tue Nov 27 19:13:53 EST 2012
selfserv with PID 27122 started at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4962: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27122 at Tue Nov 27 19:13:53 EST 2012
kill -USR1 27122
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27122 killed at Tue Nov 27 19:13:53 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27178 >/dev/null 2>/dev/null
selfserv with PID 27178 found at Tue Nov 27 19:13:53 EST 2012
selfserv with PID 27178 started at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4963: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27178 at Tue Nov 27 19:13:53 EST 2012
kill -USR1 27178
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27178 killed at Tue Nov 27 19:13:53 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27235 >/dev/null 2>/dev/null
selfserv with PID 27235 found at Tue Nov 27 19:13:53 EST 2012
selfserv with PID 27235 started at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4964: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27235 at Tue Nov 27 19:13:53 EST 2012
kill -USR1 27235
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27235 killed at Tue Nov 27 19:13:53 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27303 >/dev/null 2>/dev/null
selfserv with PID 27303 found at Tue Nov 27 19:13:53 EST 2012
selfserv with PID 27303 started at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4965: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27303 at Tue Nov 27 19:13:54 EST 2012
kill -USR1 27303
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27303 killed at Tue Nov 27 19:13:54 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27359 >/dev/null 2>/dev/null
selfserv with PID 27359 found at Tue Nov 27 19:13:54 EST 2012
selfserv with PID 27359 started at Tue Nov 27 19:13:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4966: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27359 at Tue Nov 27 19:13:54 EST 2012
kill -USR1 27359
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27359 killed at Tue Nov 27 19:13:54 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27415 >/dev/null 2>/dev/null
selfserv with PID 27415 found at Tue Nov 27 19:13:54 EST 2012
selfserv with PID 27415 started at Tue Nov 27 19:13:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4967: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27415 at Tue Nov 27 19:13:54 EST 2012
kill -USR1 27415
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27415 killed at Tue Nov 27 19:13:54 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27483 >/dev/null 2>/dev/null
selfserv with PID 27483 found at Tue Nov 27 19:13:54 EST 2012
selfserv with PID 27483 started at Tue Nov 27 19:13:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4968: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27483 at Tue Nov 27 19:13:54 EST 2012
kill -USR1 27483
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27483 killed at Tue Nov 27 19:13:54 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27539 >/dev/null 2>/dev/null
selfserv with PID 27539 found at Tue Nov 27 19:13:54 EST 2012
selfserv with PID 27539 started at Tue Nov 27 19:13:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4969: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27539 at Tue Nov 27 19:13:55 EST 2012
kill -USR1 27539
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27539 killed at Tue Nov 27 19:13:55 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Tue Nov 27 19:13:55 EST 2012
selfserv with PID 27595 started at Tue Nov 27 19:13:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4970: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27595 at Tue Nov 27 19:13:55 EST 2012
kill -USR1 27595
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27595 killed at Tue Nov 27 19:13:55 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27663 >/dev/null 2>/dev/null
selfserv with PID 27663 found at Tue Nov 27 19:13:55 EST 2012
selfserv with PID 27663 started at Tue Nov 27 19:13:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser40-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4971: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27663 at Tue Nov 27 19:13:55 EST 2012
kill -USR1 27663
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27663 killed at Tue Nov 27 19:13:55 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27719 >/dev/null 2>/dev/null
selfserv with PID 27719 found at Tue Nov 27 19:13:55 EST 2012
selfserv with PID 27719 started at Tue Nov 27 19:13:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser41-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4972: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27719 at Tue Nov 27 19:13:55 EST 2012
kill -USR1 27719
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27719 killed at Tue Nov 27 19:13:55 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27775 >/dev/null 2>/dev/null
selfserv with PID 27775 found at Tue Nov 27 19:13:55 EST 2012
selfserv with PID 27775 started at Tue Nov 27 19:13:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V :ssl3 -n TestUser42-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4973: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27775 at Tue Nov 27 19:13:55 EST 2012
kill -USR1 27775
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27775 killed at Tue Nov 27 19:13:55 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27843 >/dev/null 2>/dev/null
selfserv with PID 27843 found at Tue Nov 27 19:13:56 EST 2012
selfserv with PID 27843 started at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4974: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27843 at Tue Nov 27 19:13:56 EST 2012
kill -USR1 27843
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27843 killed at Tue Nov 27 19:13:56 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27899 >/dev/null 2>/dev/null
selfserv with PID 27899 found at Tue Nov 27 19:13:56 EST 2012
selfserv with PID 27899 started at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4975: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27899 at Tue Nov 27 19:13:56 EST 2012
kill -USR1 27899
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27899 killed at Tue Nov 27 19:13:56 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27955 >/dev/null 2>/dev/null
selfserv with PID 27955 found at Tue Nov 27 19:13:56 EST 2012
selfserv with PID 27955 started at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4976: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27955 at Tue Nov 27 19:13:56 EST 2012
kill -USR1 27955
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27955 killed at Tue Nov 27 19:13:56 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28023 >/dev/null 2>/dev/null
selfserv with PID 28023 found at Tue Nov 27 19:13:56 EST 2012
selfserv with PID 28023 started at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4977: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28023 at Tue Nov 27 19:13:56 EST 2012
kill -USR1 28023
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28023 killed at Tue Nov 27 19:13:56 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28079 >/dev/null 2>/dev/null
selfserv with PID 28079 found at Tue Nov 27 19:13:56 EST 2012
selfserv with PID 28079 started at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4978: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28079 at Tue Nov 27 19:13:57 EST 2012
kill -USR1 28079
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28079 killed at Tue Nov 27 19:13:57 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28135 >/dev/null 2>/dev/null
selfserv with PID 28135 found at Tue Nov 27 19:13:57 EST 2012
selfserv with PID 28135 started at Tue Nov 27 19:13:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4979: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28135 at Tue Nov 27 19:13:57 EST 2012
kill -USR1 28135
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28135 killed at Tue Nov 27 19:13:57 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28203 >/dev/null 2>/dev/null
selfserv with PID 28203 found at Tue Nov 27 19:13:57 EST 2012
selfserv with PID 28203 started at Tue Nov 27 19:13:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4980: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28203 at Tue Nov 27 19:13:57 EST 2012
kill -USR1 28203
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28203 killed at Tue Nov 27 19:13:57 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28259 >/dev/null 2>/dev/null
selfserv with PID 28259 found at Tue Nov 27 19:13:57 EST 2012
selfserv with PID 28259 started at Tue Nov 27 19:13:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4981: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28259 at Tue Nov 27 19:13:57 EST 2012
kill -USR1 28259
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28259 killed at Tue Nov 27 19:13:57 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28315 >/dev/null 2>/dev/null
selfserv with PID 28315 found at Tue Nov 27 19:13:57 EST 2012
selfserv with PID 28315 started at Tue Nov 27 19:13:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w bogus -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4982: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28315 at Tue Nov 27 19:13:58 EST 2012
kill -USR1 28315
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28315 killed at Tue Nov 27 19:13:58 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28383 >/dev/null 2>/dev/null
selfserv with PID 28383 found at Tue Nov 27 19:13:58 EST 2012
selfserv with PID 28383 started at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4983: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28383 at Tue Nov 27 19:13:58 EST 2012
kill -USR1 28383
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28383 killed at Tue Nov 27 19:13:58 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28439 >/dev/null 2>/dev/null
selfserv with PID 28439 found at Tue Nov 27 19:13:58 EST 2012
selfserv with PID 28439 started at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4984: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28439 at Tue Nov 27 19:13:58 EST 2012
kill -USR1 28439
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28439 killed at Tue Nov 27 19:13:58 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28495 >/dev/null 2>/dev/null
selfserv with PID 28495 found at Tue Nov 27 19:13:58 EST 2012
selfserv with PID 28495 started at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3: -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4985: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28495 at Tue Nov 27 19:13:58 EST 2012
kill -USR1 28495
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28495 killed at Tue Nov 27 19:13:58 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28563 >/dev/null 2>/dev/null
selfserv with PID 28563 found at Tue Nov 27 19:13:58 EST 2012
selfserv with PID 28563 started at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4986: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28563 at Tue Nov 27 19:13:58 EST 2012
kill -USR1 28563
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28563 killed at Tue Nov 27 19:13:58 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28619 >/dev/null 2>/dev/null
selfserv with PID 28619 found at Tue Nov 27 19:13:58 EST 2012
selfserv with PID 28619 started at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4987: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28619 at Tue Nov 27 19:13:59 EST 2012
kill -USR1 28619
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28619 killed at Tue Nov 27 19:13:59 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28675 >/dev/null 2>/dev/null
selfserv with PID 28675 found at Tue Nov 27 19:13:59 EST 2012
selfserv with PID 28675 started at Tue Nov 27 19:13:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4988: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28675 at Tue Nov 27 19:13:59 EST 2012
kill -USR1 28675
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28675 killed at Tue Nov 27 19:13:59 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28743 >/dev/null 2>/dev/null
selfserv with PID 28743 found at Tue Nov 27 19:13:59 EST 2012
selfserv with PID 28743 started at Tue Nov 27 19:13:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4989: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28743 at Tue Nov 27 19:13:59 EST 2012
kill -USR1 28743
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28743 killed at Tue Nov 27 19:13:59 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28800 >/dev/null 2>/dev/null
selfserv with PID 28800 found at Tue Nov 27 19:13:59 EST 2012
selfserv with PID 28800 started at Tue Nov 27 19:13:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4990: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28800 at Tue Nov 27 19:13:59 EST 2012
kill -USR1 28800
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28800 killed at Tue Nov 27 19:13:59 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:13:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28856 >/dev/null 2>/dev/null
selfserv with PID 28856 found at Tue Nov 27 19:13:59 EST 2012
selfserv with PID 28856 started at Tue Nov 27 19:13:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4991: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28856 at Tue Nov 27 19:14:00 EST 2012
kill -USR1 28856
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28856 killed at Tue Nov 27 19:14:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:14:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28924 >/dev/null 2>/dev/null
selfserv with PID 28924 found at Tue Nov 27 19:14:00 EST 2012
selfserv with PID 28924 started at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4992: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28924 at Tue Nov 27 19:14:00 EST 2012
kill -USR1 28924
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28924 killed at Tue Nov 27 19:14:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:14:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28980 >/dev/null 2>/dev/null
selfserv with PID 28980 found at Tue Nov 27 19:14:00 EST 2012
selfserv with PID 28980 started at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4993: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28980 at Tue Nov 27 19:14:00 EST 2012
kill -USR1 28980
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28980 killed at Tue Nov 27 19:14:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:14:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29036 >/dev/null 2>/dev/null
selfserv with PID 29036 found at Tue Nov 27 19:14:00 EST 2012
selfserv with PID 29036 started at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4994: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29036 at Tue Nov 27 19:14:00 EST 2012
kill -USR1 29036
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29036 killed at Tue Nov 27 19:14:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29104 >/dev/null 2>/dev/null
selfserv with PID 29104 found at Tue Nov 27 19:14:00 EST 2012
selfserv with PID 29104 started at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4995: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29104 at Tue Nov 27 19:14:00 EST 2012
kill -USR1 29104
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29104 killed at Tue Nov 27 19:14:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29160 >/dev/null 2>/dev/null
selfserv with PID 29160 found at Tue Nov 27 19:14:00 EST 2012
selfserv with PID 29160 started at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4996: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29160 at Tue Nov 27 19:14:01 EST 2012
kill -USR1 29160
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29160 killed at Tue Nov 27 19:14:01 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29216 >/dev/null 2>/dev/null
selfserv with PID 29216 found at Tue Nov 27 19:14:01 EST 2012
selfserv with PID 29216 started at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4997: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29216 at Tue Nov 27 19:14:01 EST 2012
kill -USR1 29216
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29216 killed at Tue Nov 27 19:14:01 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:14:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29284 >/dev/null 2>/dev/null
selfserv with PID 29284 found at Tue Nov 27 19:14:01 EST 2012
selfserv with PID 29284 started at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4998: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29284 at Tue Nov 27 19:14:01 EST 2012
kill -USR1 29284
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29284 killed at Tue Nov 27 19:14:01 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:14:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29340 >/dev/null 2>/dev/null
selfserv with PID 29340 found at Tue Nov 27 19:14:01 EST 2012
selfserv with PID 29340 started at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4999: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29340 at Tue Nov 27 19:14:01 EST 2012
kill -USR1 29340
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29340 killed at Tue Nov 27 19:14:01 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:14:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29404 >/dev/null 2>/dev/null
selfserv with PID 29404 found at Tue Nov 27 19:14:01 EST 2012
selfserv with PID 29404 started at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w bogus < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5000: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29404 at Tue Nov 27 19:14:01 EST 2012
kill -USR1 29404
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29404 killed at Tue Nov 27 19:14:01 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29474 >/dev/null 2>/dev/null
selfserv with PID 29474 found at Tue Nov 27 19:14:01 EST 2012
selfserv with PID 29474 started at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #5001: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29474 at Tue Nov 27 19:14:02 EST 2012
kill -USR1 29474
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29474 killed at Tue Nov 27 19:14:02 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:14:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29531 >/dev/null 2>/dev/null
selfserv with PID 29531 found at Tue Nov 27 19:14:02 EST 2012
selfserv with PID 29531 started at Tue Nov 27 19:14:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5002: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29531 at Tue Nov 27 19:14:02 EST 2012
kill -USR1 29531
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29531 killed at Tue Nov 27 19:14:02 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:14:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29587 >/dev/null 2>/dev/null
selfserv with PID 29587 found at Tue Nov 27 19:14:02 EST 2012
selfserv with PID 29587 started at Tue Nov 27 19:14:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #5003: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29587 at Tue Nov 27 19:14:02 EST 2012
kill -USR1 29587
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29587 killed at Tue Nov 27 19:14:02 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:14:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com \
-e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297 &
trying to connect to selfserv at Tue Nov 27 19:14:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -q \
-d ../client -v <